CN113436036A - Identity certificate processing method and device - Google Patents

Identity certificate processing method and device Download PDF

Info

Publication number
CN113436036A
CN113436036A CN202110776010.4A CN202110776010A CN113436036A CN 113436036 A CN113436036 A CN 113436036A CN 202110776010 A CN202110776010 A CN 202110776010A CN 113436036 A CN113436036 A CN 113436036A
Authority
CN
China
Prior art keywords
user
information
terminal
property
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110776010.4A
Other languages
Chinese (zh)
Other versions
CN113436036B (en
Inventor
戴美赏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202311410591.5A priority Critical patent/CN117291760A/en
Priority to CN202110776010.4A priority patent/CN113436036B/en
Publication of CN113436036A publication Critical patent/CN113436036A/en
Application granted granted Critical
Publication of CN113436036B publication Critical patent/CN113436036B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides an identity certificate processing method and device, wherein the identity certificate processing method comprises the following steps: acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal; desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal; according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal; and creating an identity certificate of the second user for the target property according to the user type.

Description

Identity certificate processing method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a method and an apparatus for processing an identity credential.
Background
With the rapid development of the economy and the driving of urban and rural construction, a large number of floating population is introduced into a city with relatively developed economy, and the floating population is generally selected to live in a rented house. The management of housing for living and renting relates to city construction, production and living of users and economic development. With the development of intelligent terminals, owners can perform online services through the intelligent terminals, but how to identify the owners and the users who live in practice so as to provide online services for the owners and the users who live in practice is an important problem in community management.
Disclosure of Invention
One or more embodiments of the present specification provide a first method for identity credential processing. The identity certificate processing method is applied to a server and comprises the following steps: and obtaining an authorization application submitted by the first user after scanning the identification code of the second user through the first terminal. Desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal. And determining the target property and the user type of the second user by interacting with the first terminal according to the authorization instruction for desensitizing user information submitted by the first terminal. And creating an identity certificate of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second identity credential processing method, applied to a first terminal, including: and acquiring and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying desensitization user information issued by the server. And acquiring an authorization instruction for the desensitized user information, which is input by the first user, and submitting the authorization instruction to the server. And interacting with the server to determine the target property and the user type of the second user.
One or more embodiments of the present specification provide a third identity credential processing method, applied to a server, including: and acquiring a certificate application submitted by a second user through the identification code of the target property scanned by the second terminal. And inquiring second user information of the second user based on a second user identifier carried in the certificate application. And transmitting the certificate application and the second user information into a third party verification interface to perform the certificate admission verification of the second user, and acquiring a returned admission verification result. And creating an identity certificate of the second user aiming at the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth identity credential processing method, applied to a second terminal, including: and acquiring an identification code of the target property to obtain a first user identification and the property identification of the target property. And submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
One or more embodiments of the present specification provide a first identity credential processing device, running on a server, including: the application acquisition module is configured to acquire an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal. And the desensitization processing module is configured to perform desensitization processing on the second user information in the authorization application and issue the obtained desensitization user information to the first terminal. And the information determination module is configured to determine a target property and the user type of the second user through interaction with the first terminal according to the authorization instruction for the desensitized user information submitted by the first terminal. And the certificate creating module is configured to create an identity certificate of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second identity credential processing apparatus, operating on a first terminal, including: and the application submitting module is configured to acquire and identify the identification code of the second user and submit the authorization application to the server based on the identification result. And the information display module is configured to receive and display desensitization user information issued by the server. And the authorization submitting module is configured to acquire an authorization instruction for the desensitized user information, which is input by the first user, and submit the authorization instruction to the server. An interaction coordination module configured to coordinate the server for interaction to determine a target property and a user type of the second user.
One or more embodiments of the present specification provide a third identity credential processing apparatus, running on a server, including: and the application acquisition module is configured to acquire a certificate application submitted by a second user through the identification code of the second terminal scanning target property. And the information query module is configured to query second user information of the second user based on a second user identifier carried in the credential application. And the admission verification module is configured to transmit the certificate application and the second user information into a third-party verification interface to perform the certificate admission verification of the second user, and acquire a returned admission verification result. And the certificate creating module is configured to create an identity certificate of the second user for the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth identity credential processing device, operating in a second terminal, including: the identification acquisition module is configured to acquire an identification code of a target property, and acquire a first user identification and the property identification of the target property. And the application submitting module is configured to submit a certificate application to a server based on the first user identification, the property identification and the read second user identification. And the reminding display module is configured to acquire and display the information transmission authorization reminding sent by the server. And the instruction submitting module is configured to acquire an authorization instruction of the second user based on the information transmission authorization prompt and submit the authorization instruction to the server.
One or more embodiments of the present specification provide a first identity credential processing device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and obtaining an authorization application submitted by the first user after scanning the identification code of the second user through the first terminal. Desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal. And determining the target property and the user type of the second user by interacting with the first terminal according to the authorization instruction for desensitizing user information submitted by the first terminal. And creating an identity certificate of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second identity credential processing device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying desensitization user information issued by the server. And acquiring an authorization instruction for the desensitized user information, which is input by the first user, and submitting the authorization instruction to the server. And interacting with the server to determine the target property and the user type of the second user.
One or more embodiments of the present specification provide a third identity credential processing device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring a certificate application submitted by a second user through the identification code of the target property scanned by the second terminal. And inquiring second user information of the second user based on a second user identifier carried in the certificate application. And transmitting the certificate application and the second user information into a third party verification interface to perform the certificate admission verification of the second user, and acquiring a returned admission verification result. And creating an identity certificate of the second user aiming at the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth identity credential processing device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring an identification code of the target property to obtain a first user identification and the property identification of the target property. And submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
One or more embodiments of the present specification provide a first storage medium storing computer-executable instructions that, when executed, implement the following: and obtaining an authorization application submitted by the first user after scanning the identification code of the second user through the first terminal. Desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal. And determining the target property and the user type of the second user by interacting with the first terminal according to the authorization instruction for desensitizing user information submitted by the first terminal. And creating an identity certificate of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying desensitization user information issued by the server. And acquiring an authorization instruction for the desensitized user information, which is input by the first user, and submitting the authorization instruction to the server. And interacting with the server to determine the target property and the user type of the second user.
One or more embodiments of the present specification provide a third storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring a certificate application submitted by a second user through the identification code of the target property scanned by the second terminal. And inquiring second user information of the second user based on a second user identifier carried in the certificate application. And transmitting the certificate application and the second user information into a third party verification interface to perform the certificate admission verification of the second user, and acquiring a returned admission verification result. And creating an identity certificate of the second user aiming at the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring an identification code of the target property to obtain a first user identification and the property identification of the target property. And submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
Drawings
In order to more clearly illustrate one or more embodiments or technical solutions in the prior art in the present specification, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive exercise;
fig. 1 is a flowchart of a processing method of an identity credential processing method according to one or more embodiments of the present disclosure;
FIG. 2 is a schematic diagram of a create guidance page provided in one or more embodiments of the present description;
FIG. 3 is a schematic view of an identity verification page provided in one or more embodiments of the present disclosure;
FIG. 4 is a schematic diagram of an information delivery authorization page provided in one or more embodiments of the present disclosure;
FIG. 5 is a schematic view of a property listing page provided in one or more embodiments of the present disclosure;
FIG. 6 is a schematic illustration of a detail presentation page provided in one or more embodiments of the disclosure;
FIG. 7 is a schematic view of an identity credential list page provided in one or more embodiments of the present description;
FIG. 8 is a schematic view of an identification code display page provided in one or more embodiments of the present disclosure;
FIG. 9 is a schematic diagram of an owner authorization page provided in one or more embodiments of the present description;
FIG. 10 is a schematic diagram of an information authorization page provided in one or more embodiments of the present description;
FIG. 11 is a schematic illustration of an expiration reminder popup provided in one or more embodiments of the present description;
FIG. 12 is a schematic diagram of a member list page provided in one or more embodiments of the present description;
FIG. 13 is a schematic illustration of an invite code presentation page provided by one or more embodiments of the disclosure;
FIG. 14 is a process flow diagram of a master identity credential creation process applied in a master identity credential creation scenario in accordance with one or more embodiments of the present specification;
fig. 15 is a flowchart of a processing method of an identity credential processing applied to a subordinate identity credential creation scenario according to one or more embodiments of the present specification;
fig. 16 is a flowchart of a second method for processing identity credentials according to one or more embodiments of the present disclosure;
fig. 17 is a flowchart of a third identity credential processing method provided in one or more embodiments of the present specification;
fig. 18 is a flowchart of a processing method of an identity credential processing applied to an identity credential creation scenario according to one or more embodiments of the present specification;
fig. 19 is a flowchart of a fourth identity credential processing method provided in one or more embodiments of the present specification;
fig. 20 is a schematic diagram of a first identity credential processing device according to one or more embodiments of the present disclosure;
fig. 21 is a schematic diagram of a second identity credential processing device according to one or more embodiments of the present disclosure;
fig. 22 is a schematic diagram of a third identity credential processing device according to one or more embodiments of the present disclosure;
fig. 23 is a schematic diagram of a fourth identity credential processing device according to one or more embodiments of the present disclosure;
fig. 24 is a schematic structural diagram of a first identity credential processing device according to one or more embodiments of the present specification;
fig. 25 is a schematic structural diagram of a second identity credential processing device according to one or more embodiments of the present specification;
fig. 26 is a schematic structural diagram of a third identity credential processing device according to one or more embodiments of the present specification;
fig. 27 is a schematic structural diagram of a fourth identity credential processing device according to one or more embodiments of the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
The first embodiment of the identity credential processing method provided in this specification:
referring to fig. 1, which shows a processing flow diagram of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a schematic diagram of a create guidance page provided in this embodiment, referring to fig. 3, which shows a schematic diagram of an identity verification page provided in this embodiment, referring to fig. 4, which shows a schematic diagram of an information transfer authorization page provided in this embodiment, referring to fig. 5, which shows a schematic diagram of a property list page provided in this embodiment, referring to fig. 6, which shows a schematic diagram of a detail presentation page provided in this embodiment, referring to fig. 7, which shows a schematic diagram of an identity credential list page provided in this embodiment, referring to fig. 8, which shows a schematic diagram of an identification code presentation page provided in this embodiment, referring to fig. 9, which shows a schematic diagram of an owner authorization page provided in this embodiment, referring to fig. 10, which shows a schematic diagram of an information authorization page provided in this embodiment, referring to fig. 11, which shows a schematic diagram of an expiration reminding popup provided in this embodiment, referring to fig. 12, which shows a schematic diagram of a member list page provided in this embodiment, referring to fig. 13, which shows a schematic diagram of an invitation code exhibition page provided in this embodiment, referring to fig. 14, which shows a flowchart of a process of creating a master identity credential applied to a scenario of creating a master identity credential provided in this embodiment, referring to fig. 15, which shows a flowchart of a process of an identity credential process method applied to a scenario of creating a slave identity credential provided in this embodiment.
Referring to fig. 1, the identity credential processing method provided in this embodiment is applied to a server, and specifically includes steps S102 to S108.
Step S102, obtaining an authorization application submitted by the first user after scanning the identification code of the second user through the first terminal.
The identity voucher processing method provided by the embodiment cooperates with a third-party verification platform, the house property information is authenticated through the identity voucher, an owner can invite families or tenants to receive the subordinate identity voucher when acquiring the main identity voucher, the families or the tenants can also create the subordinate identity voucher through owner authorization under the condition that the owner fails to receive the main identity voucher, the owner utilizes the main identity voucher, and the families or the tenants utilize the subordinate identity voucher to be effectively connected with a service provider, so that service aggregation and display are realized, and the housing experience of the owner, the families and the tenants is improved.
In practical application, a proprietor rents own property to a tenant, and the tenant needs to pay water and electricity charges, use an electronic access control and the like. In specific implementation, in order to improve convenience of the owner for enjoying community services, the owner can open the master identity certificate of own property, and realize various services such as one-card pass, one-card reservation, one-card payment and one-card voting through the master identity certificate, after the owner rents the own property to a tenant, the owner can authorize the tenant to obtain the subordinate identity certificate of the rented property, so that the tenant can enjoy corresponding services by using the subordinate identity certificate, and in addition, the owner can invite the family members to open the subordinate identity certificate, so that the family members enjoy the corresponding services.
The first user in this embodiment includes a user with property right management qualifications. Such as an owner, a title owner, or a user of a third party agency authorized by the owner. And the second user comprises a family member and/or a tenant opening the subordinate identity certificate. The identification code comprises an identification code generated based on identity information of the second user under the condition that the second user fails to open the master identity certificate. In this embodiment, if it is determined that the user has the property right management qualification, the user is determined to be the first user, and the master identity certificate is created according to the owner identity. If the user does not have property right management qualification after the verification of the third-party verification platform, the user is determined to be a second user, an identification code is generated according to the user information of the second user, the identification code is scanned and authorized by the first user, and then the subordinate identity certificate of the second user can be created.
In particular, the first user who has received the master identity credential can authorize the second user after scanning the identification code of the second user to create the slave identity credential of the second user. In an optional implementation manner provided by this embodiment, the master identity credential of the first user is opened in the following manner:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and performing identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to perform the access verification of the first user based on the information transmission authorization instruction submitted by the first terminal under the condition that the verification is passed.
Specifically, since the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third-party verification interface, and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the master identity certificate of the first user, the following steps are executed: acquiring the first user identification submitted by the first terminal; sending an information reading authorization prompt to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects an information reading authorization instruction of a first user and submits the information reading authorization instruction to a server; the server reads first user information based on the information reading authorization instruction and the first user identification, and performs biological feature recognition on the first user according to the first user information; if the identification is not passed, no processing is carried out; if the identification is passed, sending an information transmission authorization prompt to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting the information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to perform access verification of the first user.
Further, in order to guarantee the validity and authenticity of property right management quality of the first user, the third-party verification platform verifies the information of the first user, and under the condition that the first user is verified to have the property right management quality, a principal identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third-party platform performs admission verification by the following method:
based on the first user information, inquiring the property information corresponding to the first user;
sending the property information to the first terminal so that the first terminal can display the property information;
and creating a third-party identity certificate of the first user aiming at the target property selected by the first user through the property information.
Specifically, the third-party verification platform inquires the property information of the first user based on the first user information; sending the property information to a first terminal so that the first terminal can display the property information in a property list mode; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition of receiving the target property selected by the first user through the property list. In an optional implementation manner provided by this embodiment, after the third party verification platform creates the third party identity credential of the first user for the target property, the server performs the following operations:
acquiring a certificate identifier of the third-party identity certificate and a property identifier of the target property, which are returned by the third-party verification interface;
and creating a master identity certificate of the first user aiming at the target property based on the certificate identification and the property identification.
And the server creates a master identity certificate of the first user aiming at the target property according to the certificate identification of the third party identity certificate and the property identification of the target property returned by the third party verification interface. It should be noted that the property information of the first user is maintained by the third-party verification platform, and in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third-party verification platform, so that the third-party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the safety of the property information of the first user, when the third-party verification platform returns the property information of the target property to the server, desensitization processing can be performed on the property information, and then the acquired desensitization property information is returned.
For example, a first user accesses a credential application program by scanning a program identification code, searching a program name or other channels, a first terminal submits a first user identification of the first user to a server when detecting that the first user accesses the credential application program, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and after receiving the information reading authorization reminder, the first terminal renders a creation guidance page as shown in fig. 2 based on creation guidance content of an identity credential and the information reading authorization reminder and displays the creation guidance page. When detecting that a first user triggers the control of 'agreement protocol and face swiping for getting' in fig. 2, the first terminal submits an information reading authorization instruction to the server, the server receives the information reading authorization instruction, reads first user information according to a first user identification, desensitizes the first user information, sends the desensitized first user information to the first terminal, so that the first terminal collects a face image of the first user through an identity verification page shown in fig. 3, uploads the collected face image to the server, after the face image is verified by the server, sends an information transmission authorization prompt to the first terminal, the first terminal renders an information transmission authorization page shown in fig. 4 according to the information transmission authorization prompt and displays the information transmission authorization page, after detecting that the first user triggers the control of 'agreement' configured by the information transmission authorization page, submitting an information transmission authorization instruction to a server, transmitting first user information into a third-party verification interface by the server according to the information transmission authorization instruction, inquiring the property information of a property owner of a first user based on the first user information by a third-party verification platform, displaying the property information through a property list page shown in fig. 5, if detecting that the user selects 'xx cell xx multi-span 1 unit 2201' as a target property, creating a third-party owner card of the first user and the target property, and desensitizing the property identification of the target property; the server acquires the desensitized property identification returned by the third-party verification interface and the third-party owner card identification of the third-party owner card, and creates an owner card of the first user for the target property based on the desensitized property identification and the third-party owner card identification, wherein the owner card corresponds to the third-party owner card one by one. After creating the business master card, the first user may view the business master card and upon detecting a user access request to the business master card, present the user with a details presentation page as shown in fig. 6.
In addition, after creating the master identity certificate of the first user for the target property, the first user can also create master identity certificates of a plurality of properties. When a first user opens the master identity certificates of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the master identity certificates and improve the experience of the first user, if the first user opens a plurality of sets of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, the first user needs to be subjected to identity verification. Specifically, a newly added application for the identity certificate submitted by a first user through a first terminal is obtained, first user information is read based on the newly added application, and identity verification is performed on the first user according to the first user information; and if the verification is passed, transmitting the first user information into a third-party verification interface for access verification, acquiring a certificate identifier of the third-party new identity certificate and a building identifier of the new building returned by the third-party verification interface, and creating a master identity certificate of the first user for the new building based on the certificate identifier and the building identifier.
As shown in fig. 7, the first user can view the created owner card and the created auxiliary card through the identity credential list page, and can add new properties through the identity credential list page.
In specific implementation, if the result returned by the third-party verification interface is that the query result of the property information is empty, the user is determined to be a second user, an identification code of the second user is generated based on second user information of the second user, the identification code is sent to a second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user can obtain the subordinate identity certificate. In an optional implementation manner provided by this embodiment, the identification code is generated by adopting the following method:
reading the second user information according to the second user identification, and performing identity verification on the second user according to the second user information;
transmitting the second user information into a third party verification interface to perform admission verification of the second user based on an information transmission authorization instruction submitted by a second terminal under the condition that verification is passed;
and if the property information of the second user returned by the third-party verification interface is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable a second user who does not have property management qualification to receive the identity certificate by the identity of a tenant or a family member, under the condition that the query result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and is sent to the second terminal, the second user can share the identification code, and the user with the main identity certificate scans the identification code and authorizes the identification code so that the second user can receive the identity certificate.
For example, when the second terminal detects that the second user accesses the credential application, the second terminal submits a second user identifier of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and transmits the second user information to the third-party verification interface for admission verification based on the information transmission authorization instruction of the second user when the verification is passed, if the verification result returned by the third-party verification interface is obtained as that the property information of the second user is empty, an identification code is generated according to the second user information and is sent to the second terminal, and the second terminal renders and displays an identification code display page as shown in fig. 8 based on the identification code after receiving the identification code.
It should be noted that, after the second user acquires the identification code, the second user may share the identification code, and after the identification code is scanned, the authorization authority verification is performed on the first user who scans the identification code, that is, whether the first user has the master identity credential is verified. In an optional implementation manner provided by this embodiment, the first terminal acquires and identifies the identification code of the second user, and submits an authorization application to the server based on the identification result, and after the server obtains the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal, the following operations are performed: querying whether the first user has a master identity credential based on the first user identification; if yes, executing the following step S104, performing desensitization processing on the second user information in the authorization application, and issuing the obtained desensitization user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2.
And step S104, desensitizing the second user information in the authorization application, and issuing the acquired desensitized user information to the first terminal.
In specific implementation, in order to avoid information leakage caused by the fact that the first user does not have the certificate authority to check the information of the second user, after the authorization application is obtained, the certificate authority is verified for the first user according to the first user identification in the authorization application; in order to improve the perception degree of the first user to the second user information, prevent the second user from forging the identification code to obtain authorization, further draw the identity certificate to cause loss to the first user, and send the second user information to the first terminal under the condition that the first user is determined to have the certificate authorization authority so that the first user confirms the second user information; because the second user information at least comprises the name, the contact way and the identity of the second user, in order to further prevent the second user information from being leaked and ensure the information security of the second user, desensitization treatment is carried out on the second user information before the second user information is sent to the first terminal, and the second user information after desensitization treatment is sent to the first terminal, so that the first terminal displays the second user information after desensitization treatment.
In the process, the first terminal receives and displays desensitization user information issued by the server, acquires an authorization instruction for the desensitization user information, which is input by the first user, and submits the authorization instruction to the server.
For example, under the condition that the identification code of the second user is scanned by the first terminal, acquiring an authorization application submitted by the first terminal based on the identification result of the identification code, and inquiring whether the first user creates the business master card based on the authorization application; if not, sending a starting prompt to the first terminal so that the first terminal displays the created guide page shown in the figure 2; if so, desensitizing the second user information in the identification result to obtain desensitized user information, sending the desensitized user information to the first terminal, and rendering and displaying an owner authorization page shown in fig. 9 by the first terminal based on the desensitized user information.
And step S106, determining the target property and the user type of the second user through interaction with the first terminal according to the authorization instruction for desensitizing the user information submitted by the first terminal.
In specific implementation, the first terminal submits an authorization instruction of the first user for the second user information to the server after acquiring the authorization instruction, and the server determines the user types of the target property and the second user through interaction with the first terminal according to the authorization instruction.
As described above, in an optional implementation manner provided in this embodiment, whether the first user has a primary identity credential is queried based on the first user identifier, if yes, step S104 is executed to perform desensitization processing on the second user information in the authorization application, and send the obtained desensitization user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2. Correspondingly, in the process of determining the target property and the user type of the second user through interaction with the first terminal, the following steps are executed:
reading the property identification in the master identity certificate, and sending the property identification to the first terminal so as to display the first terminal;
acquiring the property identification of the target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identification of the target property;
and acquiring the user type submitted by the first terminal.
Specifically, the server reads the property identifier of the master identity certificate created by the first user according to the authorization instruction submitted by the first terminal, and sends the property identifier to the first terminal; the first terminal displays the property identification in a form of a property identification list so that the first user selects a target property for authorization; the method comprises the steps that a first terminal submits a property identification of a target property to a server under the condition that a first user selects the target property; the server sends a type selection prompt of the second user to the first terminal based on the property identification; and after receiving the type selection prompt, the first terminal renders and displays a user type acquisition page, and if the first user is detected to input the user type through the type acquisition page, the user type is submitted to the server.
For example, after receiving an authorization instruction submitted by a business owner terminal, the server queries at least one business owner card which is already created according to a business owner identifier, reads a property identifier corresponding to each business owner card, sends the property identifier to the business owner terminal, so that the business owner terminal displays the property identifier of a target property for authorization to the business owner in a form of a property identifier list, the business owner can select the property identifier of the target property for authorization, sends a type selection prompt to the business owner terminal after obtaining the property identifier of the target property, and the business owner terminal prompts a rendering type acquisition page according to the type selection prompt and displays the rendering type acquisition page, and submits the rendering type to the server after acquiring the type of a user input by the business owner.
In addition, in this embodiment, for the user type, the page for displaying desensitized user information may be collected. Specifically, after receiving desensitization user information, the first terminal renders and displays an information authorization page shown in fig. 10 based on the desensitization information, the first user enters a user type through the information authorization page, if the user type is a tenant type, an effective period is entered through the information authorization page, and the first user submits an authorization instruction of the first user and the user type to the server through an "approve" control configured by triggering the information authorization page; correspondingly, in the implementation process of determining the target property and the user type of the second user through interaction with the first terminal, the server reads the property identifier in the master identity certificate of the first user and sends the property identifier to the first terminal so as to display the first terminal; the server obtains the property identification of the target property selected by the first user and submitted by the first terminal.
Step S108, according to the user type, creating an identity certificate of the second user aiming at the target property.
The user type comprises a family type and/or a tenant type. And if the user type is the tenant type, configuring an effective period for the created identity certificate.
In practical application, the family of the first user can open the identity certificate of the target property, if the first user rents the target property to a tenant, the tenant can also open the identity certificate of the target property, but the tenant has a certain term for renting the target property, and the house is not a permanent residence.
In order to improve the convenience of using the identity certificate by the owner and the tenant and the perception degree of the owner and the tenant on the certificate application program, if the user type selected by the owner is the tenant type, the owner is reminded to enter the valid period of the identity certificate, the tenant can enjoy the corresponding service through the identity certificate within the valid period, and after the valid period is up, the identity certificate of the tenant is cancelled. In an optional implementation manner provided by this embodiment, in the process of creating the identity credential of the second user for the target property according to the user type, the following steps are performed:
if the user type is a tenant type, acquiring the valid period of the subordinate identity certificate of the target property authorized by the first user to use by the second user;
creating a subordinate identity certificate of the second user for the target property based on the tenant type and the valid period;
and if the user type is the family type, establishing a subordinate identity certificate of the second user for the target property based on the family type.
In a first optional implementation manner provided in this embodiment, if the user type is a tenant type, the created subordinate identity credential for the target property is configured with an expiration date, and if it is detected that the expiration date of the subordinate identity credential reaches, an expiration reminder is sent to the second terminal, so that the second terminal performs display; after receiving the expiration reminder, the second terminal can reach the expiration reminder to the second user in the modes of instant messaging or in-station messaging and the like, and the expiration reminder is displayed to the second user when the second user accesses the subordinate identity certificate.
As shown in fig. 11, if the second user accesses the secondary card after the expiration date of the secondary card is reached, the expiration reminder is presented to the second user through an expiration reminder popup. The user can sell the secondary card through the expiration reminding popup window.
In a second optional implementation manner provided in this embodiment, if owner information of a target property maintained by the third party verification platform changes, the server receives an owner change reminder transmitted from the third party verification interface, and sends a property failure reminder to the first terminal based on the owner change reminder, so that the first terminal displays the property failure reminder when the first user accesses the owner identity credential. It should be noted that the first user and the second user may actively initiate logoff requests for the master identity credential and the slave identity credential.
In addition, in order to improve the perception degree of the owner on the certificate application program and improve the simplicity of the owner after the owner rents the house to the tenant, the owner can also actively invite the tenant or the family to receive the subordinate identity certificate after creating the main identity certificate. In this embodiment, after the first user creates the master identity credential for the target property, the family members or the tenants can be invited to receive the slave identity credential through the member management item of the master identity credential. In an optional implementation manner provided by this embodiment, the sharing request for the target property submitted by the first terminal is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation codes, renders an invitation code display page based on the family invitation codes and displays the invitation code display page, and the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, collecting the valid period of the subordinate identity certificate which is authorized by the first user to be used by the second user; submitting the valid period to the server; and the server generates the tenant invitation code based on the valid period, the property identification and the first user identification and sends the tenant invitation code to the first terminal so as to display the first terminal. It should be noted that the family invitation code and the tenant invitation code are both the identification codes of the target property. In an optional implementation manner provided by this embodiment, the identification code of the target property is generated as follows:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of the target property leased by the first user;
generating the identification code based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, if the owner views the detail display page shown in fig. 6 and triggers the member management item, the owner terminal displays the member list page shown in fig. 12, where the member list includes a user who picks up the owner card or the auxiliary card for the target property, and desensitizes the display of the member information in the member list in order to protect the information security of the user. The method comprises the steps that a member control is added by triggering of a proprietor, a proprietor terminal submits a sharing request aiming at a target property to a server, the server generates a family invitation code based on a property identification of the target property and the proprietor identification and sends the family invitation code to the proprietor terminal, the proprietor terminal renders an invitation code display page shown in figure 13 and displays the invitation code display page, if the proprietor terminal detects that a 'tenant invitation code' control configured on the invitation code display page is triggered, the proprietor is reminded to enter a valid period and submits the valid period to the server, the server creates a tenant code based on the valid period, the property identification and the proprietor identification and sends the tenant invitation code to the proprietor terminal, and the proprietor terminal displays the tenant invitation code after receiving the tenant invitation code. The owner can send the invitation code to the second user through a sharing invitation control configured on the invitation code display page.
In an optional implementation manner provided by this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring the identification code of the target property to obtain the first user identification and the property identification of the target property;
and submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through scanning the identification code of the target property by the second terminal.
In order to prevent the second user from opening the card for multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying the second user for the presence of the identity credential for the target property;
if so, sending an identity certificate viewing prompt to the second terminal so that the second terminal can display the identity certificate;
and if not, inquiring second user information of the second user based on a second user identifier carried in the certificate application.
In particular, in order to ensure the validity of the second user who scans the identification code of the target property, in an optional implementation manner provided by this embodiment, the subordinate identity certificate of the second user is created as follows:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
Specifically, if the second user does not receive the identity certificate for the target property after the query, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server and submits the information reading authorization prompt to the server when acquiring an information reading authorization instruction of a second user; the server inquires second user information of a second user based on a second user identifier carried in the certificate application after receiving the information reading authorization instruction, sends an information transmission authorization prompt to a second terminal based on the second user information after reading the second user information, displays the information transmission authorization prompt by the second terminal, and submits the information transmission authorization instruction of the second user to the server after acquiring the information transmission authorization instruction; the server transmits the certificate application and the second user information to a third party verification interface according to the information transmission authorization instruction to perform certificate access verification of the second user, and obtains a returned access verification result.
It should be noted that, in the process of performing the certificate admission verification by the third party verification platform, it needs to verify whether the second user has the property right management qualification of the target property, and whether the first user is the property right person of the target property. In an optional implementation manner provided by this embodiment, the third party verification platform performs credential admission verification by the following method:
verifying whether the second user is a property owner of the target property based on the second user information;
if yes, returning the second user to the server as the property owner of the target property;
if not, checking whether the first user is the property owner of the target property based on the first user information carried by the certificate application; if yes, determining that the admission verification is passed; if not, determining that the admission verification fails.
Further, in the process of creating an identity certificate of a second user for a target property, if an admission verification result returned by the third-party verification interface is that the second user is a property owner of the target property, creating a master identity certificate of the second user for the target property; if the access verification result returned by the third-party verification interface is that verification is passed, a subordinate identity certificate of the second user aiming at the target property is created; and if the access verification result returned by the third-party verification interface is that the verification fails, the third-party verification interface does not process the access verification result.
In the process of scanning the identification code of the target property by the second user to create the identity certificate, in an optional implementation manner provided by this embodiment, the second terminal performs the following steps: acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property; submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
The following takes the scenario of creating a master identity credential provided in this embodiment as an example to further describe the process of creating a master identity credential provided in this embodiment, and with reference to fig. 14, the process of creating a master identity credential applied to the scenario of creating a master identity credential specifically includes the following steps.
Step S1404, issuing an information reading authorization reminder to the first terminal based on the first user identifier.
Before this, the first terminal submits the first user identification to the server.
After that, the first terminal renders and creates a guide page based on the information reading authorization prompt and displays the guide page; and collecting the information reading authorization instruction of the first user and submitting the information reading authorization instruction to the server.
Step S1410, reading the first user information based on the information reading authorization instruction, and issuing an information transmission authorization prompt to the first terminal based on the first user information.
After that, the first terminal reminds the acquisition of the information transmission authorization instruction based on the information transmission authorization and submits the information transmission authorization instruction to the server.
Step S1414, the first user information is transmitted to the third party verification interface for admission verification based on the information transmission authorization instruction.
Step S1416, obtain the property identifier of the target property returned by the third party verification interface.
Step S1418, based on the property identification, a master identity credential of the first user for the target property is created.
The identity credential processing method provided in this embodiment is further described below by taking an application of the identity credential processing method provided in this embodiment in a subordinate identity credential creation scenario as an example, and referring to fig. 15, the identity credential processing method applied in the subordinate identity credential creation scenario specifically includes the following steps.
Step S1506, query the first user' S identity credential according to the authorization application.
Before that, the first terminal collects and identifies the identification code of the second user, and submits an authorization application to the server based on the identification result.
The identification code of the second user is generated in the following mode: the second terminal submits a second user identification to the server, the server issues an information reading authorization prompt to the second terminal based on the second user identification, the second terminal renders, creates and displays a guide page based on the information reading authorization prompt, acquires an information reading authorization instruction of the second user and submits the information reading authorization instruction to the server, the server reads second user information based on the information reading authorization instruction and issues an information transmission authorization prompt to the second terminal based on the second user information, the second terminal transmits an information transmission authorization instruction based on the information transmission authorization prompt and submits the information transmission authorization instruction to the server, the server transmits the second user information to a third-party verification interface based on the information transmission authorization instruction to perform admission verification, the property information of the second user returned by the third-party verification interface is acquired to be empty, and then an identification code of the second user is generated based on the second user information.
In step S1508, if the master identity credential is not null, desensitizing the second user information in the authorization application.
Step S1510, the desensitization user information obtained by the desensitization processing is sent to the first terminal.
After that, the first terminal renders an owner authorization page according to the desensitization user information and displays the owner authorization page; and acquiring and submitting an authorization instruction of the first user to the server.
Step S1516, based on the authorization instruction, the property identification corresponding to the master identity certificate is read.
Step S1518, the property mark is issued to the first terminal.
After that, the first terminal displays the property identification in the form of a property list and determines a target property selected by the first user; and sending the property identification of the target property to the server.
Step 1524, sending a type selection prompt to the first terminal, and acquiring the user type submitted by the first terminal.
Step S1526, based on the user type, a subordinate identity certificate of the second user for the target property is created.
It should be noted that the master identity credential creating process and the identity credential processing method applied to the slave identity credential creating scenario may be arbitrarily split and combined, for example, first, the master identity credential of the first user is created through the master identity credential creating process, and in the process of creating the master identity credential of the second user through the master identity credential creating process, if the property identifier returned by the third-party verification interface in step S1416 is acquired as empty, the slave identity credential of the second user is created through the identity credential processing method applied to the slave identity credential creating scenario.
To sum up, in the identity credential processing method provided in this embodiment, an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal is first obtained, desensitization processing is then performed on second user information in the authorization application, the obtained desensitization user information is issued to the first terminal, a user type of a target property and a user type of a second user are determined through interaction with the first terminal according to an authorization instruction for desensitization user information submitted by the first terminal, and finally an identity credential of the second user for the target property is created according to the user type, so that convenience of using a credential application program by the user is improved, and user experience is improved.
The second embodiment of the identity credential processing method provided in this specification:
referring to fig. 16, which shows a processing flow chart of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a schematic diagram of a create guidance page provided in this embodiment, referring to fig. 3, which shows a schematic diagram of an identity verification page provided in this embodiment, referring to fig. 4, which shows a schematic diagram of an information transfer authorization page provided in this embodiment, referring to fig. 5, which shows a schematic diagram of a property list page provided in this embodiment, referring to fig. 6, which shows a schematic diagram of a detail presentation page provided in this embodiment, referring to fig. 7, which shows a schematic diagram of an identity credential list page provided in this embodiment, referring to fig. 8, which shows a schematic diagram of an identification code presentation page provided in this embodiment, referring to fig. 9, which shows a schematic diagram of an owner authorization page provided in this embodiment, referring to fig. 10, which shows a schematic diagram of an information authorization page provided in this embodiment, referring to fig. 11, which shows a schematic diagram of an expiration reminding popup provided in this embodiment, referring to fig. 12, which shows a schematic diagram of a member list page provided in this embodiment, referring to fig. 13, which shows a schematic diagram of an invitation code exhibition page provided in this embodiment, referring to fig. 14, which shows a flowchart of a process of creating a master identity credential applied to a scenario of creating a master identity credential provided in this embodiment, referring to fig. 15, which shows a flowchart of a process of an identity credential process method applied to a scenario of creating a slave identity credential provided in this embodiment.
Referring to fig. 16, the identity credential processing method provided in this embodiment is applied to the first terminal, and specifically includes steps S1602 to S1608.
An execution subject of the identity credential processing method provided in this embodiment is a first terminal, an execution subject of the first identity credential processing method embodiment provided in this specification is a server, and the identity credential processing method applied to the first terminal provided in this embodiment is mutually matched with the identity credential processing method applied to the server provided in the above method embodiment in an execution process, so please read corresponding contents of this embodiment in comparison with the above method embodiment.
Step S1602, collecting and identifying an identification code of the second user, and submitting an authorization application to the server based on the identification result.
The identity voucher processing method provided by the embodiment cooperates with a third-party verification platform, the house property information is authenticated through the identity voucher, an owner can invite families or tenants to receive the subordinate identity voucher when acquiring the main identity voucher, the families or the tenants can also create the subordinate identity voucher through owner authorization under the condition that the owner fails to receive the main identity voucher, the owner utilizes the main identity voucher, and the families or the tenants utilize the subordinate identity voucher to be effectively connected with a service provider, so that service aggregation and display are realized, and the housing experience of the owner, the families and the tenants is improved.
In practical application, a proprietor rents own property to a tenant, and the tenant needs to pay water and electricity charges, use an electronic access control and the like. In specific implementation, in order to improve convenience of the owner for enjoying community services, the owner can open the master identity certificate of own property, and realize various services such as one-card pass, one-card reservation, one-card payment and one-card voting through the master identity certificate, after the owner rents the own property to a tenant, the owner can authorize the tenant to obtain the subordinate identity certificate of the rented property, so that the tenant can enjoy corresponding services by using the subordinate identity certificate, and in addition, the owner can invite the family members to open the subordinate identity certificate, so that the family members enjoy the corresponding services.
In this embodiment, the first terminal corresponds to a first user, and the first user includes a user with property right management qualifications. Such as an owner, a title owner, or a user of a third party agency authorized by the owner. And the second user comprises a family member and/or a tenant opening the subordinate identity certificate. The identification code comprises an identification code generated based on identity information of the second user under the condition that the second user fails to open the master identity certificate. In this embodiment, if it is determined that the user has the property right management qualification, the user is determined to be the first user, and the master identity certificate is created according to the owner identity. If the user does not have property right management qualification after the verification of the third-party verification platform, the user is determined to be a second user, an identification code is generated according to the user information of the second user, the identification code is scanned and authorized by the first user, and then the subordinate identity certificate of the second user can be created.
In particular, the first user who has received the master identity credential can authorize the second user after scanning the identification code of the second user to create the slave identity credential of the second user. In this embodiment, the server opens the master identity credential of the first user as follows:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and performing identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to perform the access verification of the first user based on the information transmission authorization instruction submitted by the first terminal under the condition that the verification is passed.
Specifically, since the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third-party verification interface, and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the master identity certificate of the first user, the following steps are executed: the server acquires the first user identification submitted by the first terminal; sending an information reading authorization prompt to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects an information reading authorization instruction of a first user and submits the information reading authorization instruction to a server; the server reads first user information based on the information reading authorization instruction and the first user identification, and performs biological feature recognition on the first user according to the first user information; if the identification is not passed, no processing is carried out; if the identification is passed, sending an information transmission authorization prompt to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting the information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to perform access verification of the first user.
Further, in order to guarantee the validity and authenticity of property right management quality of the first user, the third-party verification platform verifies the information of the first user, and under the condition that the first user is verified to have the property right management quality, a principal identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third-party platform performs admission verification by the following method:
based on the first user information, inquiring the property information corresponding to the first user;
sending the property information to the first terminal so that the first terminal can display the property information;
and creating a third-party identity certificate of the first user aiming at the target property selected by the first user through the property information.
Specifically, the third-party verification platform inquires the property information of the first user based on the first user information; sending the property information to a first terminal; the first terminal receives the property information and displays the property information in a property list mode; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition of receiving the target property selected by the first user through the property list. In this embodiment, after the third party verification platform creates the third party identity credential of the first user for the target property, the server performs the following operations:
acquiring a certificate identifier of the third-party identity certificate and a property identifier of the target property, which are returned by the third-party verification interface;
and creating a master identity certificate of the first user aiming at the target property based on the certificate identification and the property identification.
And the server creates a master identity certificate of the first user aiming at the target property according to the certificate identification of the third party identity certificate and the property identification of the target property returned by the third party verification interface. It should be noted that the property information of the first user is maintained by the third-party verification platform, and in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third-party verification platform, so that the third-party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the safety of the property information of the first user, when the third-party verification platform returns the property information of the target property to the server, desensitization processing can be performed on the property information, and then the acquired desensitization property information is returned.
For example, a first user accesses a credential application program by scanning a program identification code, searching a program name or other channels, a first terminal submits a first user identification of the first user to a server when detecting that the first user accesses the credential application program, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and after receiving the information reading authorization reminder, the first terminal renders a creation guidance page as shown in fig. 2 based on creation guidance content of an identity credential and the information reading authorization reminder and displays the creation guidance page. When detecting that a first user triggers the control of 'agreement protocol and face swiping for getting' in fig. 2, the first terminal submits an information reading authorization instruction to the server, the server receives the information reading authorization instruction, reads first user information according to a first user identification, desensitizes the first user information, sends the desensitized first user information to the first terminal, so that the first terminal collects a face image of the first user through an identity verification page shown in fig. 3, uploads the collected face image to the server, after the face image is verified by the server, sends an information transmission authorization prompt to the first terminal, the first terminal renders an information transmission authorization page shown in fig. 4 according to the information transmission authorization prompt and displays the information transmission authorization page, after detecting that the first user triggers the control of 'agreement' configured by the information transmission authorization page, submitting an information transmission authorization instruction to a server, transmitting first user information into a third-party verification interface by the server according to the information transmission authorization instruction, inquiring the property information of a property owner of a first user based on the first user information by a third-party verification platform, displaying the property information through a property list page shown in fig. 5, if detecting that the user selects 'xx cell xx multi-span 1 unit 2201' as a target property, creating a third-party owner card of the first user and the target property, and desensitizing the property identification of the target property; the server acquires the desensitized property identification returned by the third-party verification interface and the third-party owner card identification of the third-party owner card, and creates an owner card of the first user for the target property based on the desensitized property identification and the third-party owner card identification, wherein the owner card corresponds to the third-party owner card one by one. After creating the business master card, the first user may view the business master card and upon detecting a user access request to the business master card, present the user with a details presentation page as shown in fig. 6.
In addition, after creating the master identity certificate of the first user for the target property, the first user can also create master identity certificates of a plurality of properties. When a first user opens the master identity certificates of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the master identity certificates and improve the experience of the first user, if the first user opens a plurality of sets of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, the first user needs to be subjected to identity verification. Specifically, the server obtains a new application for the identity certificate submitted by a first user through a first terminal; reading first user information based on the new application; performing identity verification on the first user according to the first user information; if the verification is passed, the first user information is transmitted to a third party verification interface for access verification; acquiring a certificate identifier of a third party new identity certificate and a building identifier of a new building returned by a third party verification interface; and creating a master identity certificate of the first user for the newly added property based on the certificate identifier and the property identifier.
As shown in fig. 7, the first user can view the created owner card and the created auxiliary card through the identity credential list page, and can add new properties through the identity credential list page.
In specific implementation, if the result returned from the third-party verification interface to the server is that the result of querying the property information is null, the server determines that the user is a second user, generates an identification code of the second user based on second user information of the second user, sends the identification code to the second terminal, and the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user can obtain the subordinate identity certificate. In this embodiment, the identification code is generated as follows:
reading the second user information according to the second user identification, and performing identity verification on the second user according to the second user information;
transmitting the second user information into a third party verification interface to perform admission verification of the second user based on an information transmission authorization instruction submitted by a second terminal under the condition that verification is passed;
and if the property information of the second user returned by the third-party verification interface is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable a second user who does not have property management qualification to receive the identity certificate by the identity of a tenant or a family member, under the condition that the query result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and is sent to the second terminal, the second user can share the identification code, and the user with the main identity certificate scans the identification code and authorizes the identification code so that the second user can receive the identity certificate.
For example, when the second terminal detects that the second user accesses the credential application, the second terminal submits a second user identifier of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and transmits the second user information to the third-party verification interface for admission verification based on the information transmission authorization instruction of the second user when the verification is passed, if the verification result returned by the third-party verification interface is obtained as that the property information of the second user is empty, an identification code is generated according to the second user information and is sent to the second terminal, and the second terminal renders and displays an identification code display page as shown in fig. 8 based on the identification code after receiving the identification code.
It should be noted that, after the second user acquires the identification code, the second user may share the identification code, and after the identification code is scanned, the authorization authority verification is performed on the first user who scans the identification code, that is, whether the first user has the master identity credential is verified. In an optional implementation manner provided by this embodiment, the first terminal acquires and identifies the identification code of the second user, and submits an authorization application to the server based on the identification result, and after the server obtains the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal, the following operations are performed: querying whether the first user has a master identity credential based on the first user identification; if so, desensitizing the second user information in the authorization application, and issuing the obtained desensitizing user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2.
Step S1604, receiving and displaying desensitization identity information issued by the server.
In specific implementation, in order to avoid information leakage caused by the fact that the first user does not have the certificate authority to check the information of the second user, after the authorization application is obtained, the server verifies the certificate authority for the first user according to the first user identification in the authorization application; in order to improve the perception degree of the first user to the second user information, prevent the second user from forging the identification code to obtain authorization, further draw the identity certificate to cause loss to the first user, and display the second user information under the condition that the first user is determined to have the certificate authorization authority so that the first user confirms the second user information; because the second user information at least comprises the name, the contact way and the identity of the second user, in order to further prevent the second user information from being leaked and ensure the information security of the second user, the server carries out desensitization processing on the second user information before sending the second user information to the first terminal, and sends the desensitized second user information to the first terminal, so that the first terminal displays the desensitized second user information.
In the process, desensitization user information sent by the server is received and displayed, and an authorization instruction for the desensitization user information, which is input by a first user, is obtained and submitted to the server.
For example, when the identification code of the second user is scanned, an authorization application is submitted based on the identification result of the identification code, and the server inquires whether the first user creates the owner card based on the authorization application; if not, the first terminal receives the opening prompt sent by the server and displays the created guide page shown in fig. 2; if so, the server performs desensitization processing on the second user information in the identification result to obtain desensitization user information, the first terminal receives the desensitization user information sent by the server, and renders and displays an owner authorization page shown in fig. 9 based on the desensitization user information.
Step S1606, the authorization instruction for desensitization identity information, which is input by the first user, is obtained and submitted to the server.
In specific implementation, the authorization instruction of the first user for the second user information is obtained and then submitted to the server, and the server interacts with the first terminal to determine the user types of the target property and the second user according to the authorization instruction.
Step S1608, interacting with the server to determine the target property and the user type of the second user.
In the embodiment, the server queries whether the first user has the master identity certificate or not based on the first user identifier, if so, performs desensitization processing on second user information in the authorization application, and issues the obtained desensitization user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2. Correspondingly, in the process that the first terminal cooperates with the server to perform interaction so as to determine the target property and the user type of the second user, the following steps are executed:
receiving the property identification sent by the server, and displaying the property identification in a form of a property identification list;
acquiring the property identification of the target property selected by the first user through the property identification list, and submitting the property identification of the target property to the server;
and receiving a type selection prompt sent by the server, collecting the user type of the second user based on the type selection prompt and submitting the user type to the server.
Specifically, the server reads the property identifier of the master identity certificate created by the first user according to the authorization instruction submitted by the first terminal, and sends the property identifier to the first terminal; the first terminal displays the property identification in a form of a property identification list so that the first user selects a target property for authorization; the method comprises the steps that a first terminal submits a property identification of a target property to a server under the condition that a first user selects the target property; the server sends a type selection prompt of the second user to the first terminal based on the property identification; and after receiving the type selection prompt, the first terminal renders and displays a user type acquisition page, and if the first user is detected to input the user type through the type acquisition page, the user type is submitted to the server.
For example, after receiving an authorization instruction submitted by a business owner terminal, a server queries at least one business owner card which is created according to a business owner identifier, reads a property identifier corresponding to each business owner card, sends the property identifier to the business owner terminal, so that the business owner terminal displays the property identifier of a target property which is authorized to the business owner in a property identifier list mode, sends a type selection prompt to the business owner terminal after acquiring the property identifier of the target property, and the business owner terminal prompts a rendering type acquisition page according to the type selection prompt and displays the rendering type acquisition page, and submits the rendering type acquisition page to the server after acquiring the type of a user which is input by the business owner.
In addition, in this embodiment, for the user type, the page for displaying desensitized user information may be collected. Specifically, after desensitization user information is received, an information authorization page shown in fig. 10 is rendered and displayed based on the desensitization information, a first user enters a user type through the information authorization page, if the user type is a tenant type, an effective period is entered through the information authorization page, and the first user submits an authorization instruction of the first user and the user type to a server through an 'approval to open' control configured by triggering the information authorization page; correspondingly, in the implementation process of determining the target property and the user type of the second user by matching with the server for interaction, receiving the property identification in the master identity certificate of the first user read and sent by the server, and displaying the property identification; under the condition that the first user selects the target property, submitting the property identification of the target property to a server; the server obtains the property identification of the target property selected by the first user and submitted by the first terminal.
The user type comprises a family type and/or a tenant type. And if the user type is the tenant type, configuring an effective period for the created identity certificate.
In practical application, the family of the first user can open the identity certificate of the target property, if the first user rents the target property to a tenant, the tenant can also open the identity certificate of the target property, but the tenant has a certain term for renting the target property, and the house is not a permanent residence.
In order to improve the convenience of using the identity certificate by the owner and the tenant and the perception degree of the owner and the tenant on the certificate application program, if the user type selected by the owner is the tenant type, the owner is reminded to enter the valid period of the identity certificate, the tenant can enjoy the corresponding service through the identity certificate within the valid period, and after the valid period is up, the identity certificate of the tenant is cancelled. In this embodiment, in the process of creating, by the server, the identity credential of the second user for the target property according to the user type, the following steps are performed:
if the user type is a tenant type, acquiring the valid period of the subordinate identity certificate of the target property authorized by the first user to use by the second user;
creating a subordinate identity certificate of the second user for the target property based on the tenant type and the valid period;
and if the user type is the family type, establishing a subordinate identity certificate of the second user for the target property based on the family type.
In specific implementation, if the user type is a tenant type, the established subordinate identity certificate aiming at the target property is configured with an expiration date, and if the server detects that the expiration date of the subordinate identity certificate reaches, the server sends an expiration reminder to the second terminal so as to display the second terminal; after receiving the expiration reminder, the second terminal can reach the expiration reminder to the second user in the modes of instant messaging or in-station messaging and the like, and the expiration reminder is displayed to the second user when the second user accesses the subordinate identity certificate.
As shown in fig. 11, if the second user accesses the secondary card after the expiration date of the secondary card is reached, the expiration reminder is presented to the second user through an expiration reminder popup. The user can sell the secondary card through the expiration reminding popup window.
It should be noted that, if owner information of a target property maintained by the third-party verification platform changes, the server receives an owner change reminder transmitted from the third-party verification interface, and sends a property failure reminder to the first terminal based on the owner change reminder, so that the first terminal displays the property failure reminder when the first user accesses the owner identity certificate. It should be noted that the first user and the second user may actively initiate logoff requests for the master identity credential and the slave identity credential.
In addition, in order to improve the perception degree of the owner on the certificate application program and improve the simplicity of the owner after the owner rents the house to the tenant, the owner can also actively invite the tenant or the family to receive the subordinate identity certificate after creating the main identity certificate. In this embodiment, after the first user creates the master identity credential for the target property, the family members or the tenants can be invited to receive the slave identity credential through the member management item of the master identity credential. In this embodiment, a server obtains a sharing request for the target property submitted by the first terminal; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation codes, renders an invitation code display page based on the family invitation codes and displays the invitation code display page, and the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, collecting the valid period of the subordinate identity certificate which is authorized by the first user to be used by the second user; submitting the valid period to the server; and the server generates the tenant invitation code based on the valid period, the property identification and the first user identification and sends the tenant invitation code to the first terminal so as to display the first terminal. It should be noted that the family invitation code and the tenant invitation code are both the identification codes of the target property. The identification code of the target property is initiated by the first user and generated based on the first user information of the first user, the user type of the second user selected by the first user and the property identification of the target property.
In this embodiment, the identification code of the target property is generated in the following manner:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of the target property leased by the first user;
generating the identification code based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, if the owner views the detail display page shown in fig. 6 and triggers the member management item, the member list page shown in fig. 12 is displayed, where the member list includes a user who picks up the owner card or the subsidiary card for the target property, and the member information in the member list is desensitized to display in order to protect the information security of the user. The method comprises the steps that a proprietor triggers an addition member control, a sharing request aiming at a target property is submitted to a server, the server generates a family invitation code based on a property identification of the target property and the proprietor identification and sends the family invitation code to a proprietor terminal, the proprietor terminal renders an invitation code display page shown in figure 13 and displays the invitation code display page, if the situation that a 'tenant invitation code' control configured on the invitation code display page is triggered is detected, the proprietor is reminded to enter a valid period and submits the valid period to the server, the server creates a tenant invitation code based on the valid period, the property identification and the proprietor identification and sends the tenant invitation code to the proprietor terminal, and the proprietor terminal displays the tenant invitation code after receiving the tenant invitation code. The owner can send the invitation code to the second user through a sharing invitation control configured on the invitation code display page.
During specific implementation, the first terminal shares the identification code of the target property with the second terminal, and the second terminal executes the following operations after receiving the identification code of the target property shared by the first terminal:
acquiring the identification code of the target property to obtain the first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
accordingly, the server performs the following operations: and acquiring the certificate application submitted by the second user through scanning the identification code of the target property by the second terminal.
In order to prevent the second user from opening the card for multiple times, after the server obtains the credential application, the following operations are further executed:
querying the second user for the presence of the identity credential for the target property;
if so, sending an identity certificate viewing prompt to the second terminal so that the second terminal can display the identity certificate;
and if not, inquiring second user information of the second user based on a second user identifier carried in the certificate application.
In order to guarantee the validity of the second user scanning the identification code of the target property, the server creates a subordinate identity certificate of the second user by the following means:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
Specifically, if the second user does not receive the identity certificate for the target property after the query, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server and submits the information reading authorization prompt to the server when acquiring an information reading authorization instruction of a second user; the server inquires second user information of a second user based on a second user identifier carried in the certificate application after receiving the information reading authorization instruction, sends an information transmission authorization prompt to a second terminal based on the second user information after reading the second user information, displays the information transmission authorization prompt by the second terminal, and submits the information transmission authorization instruction of the second user to the server after acquiring the information transmission authorization instruction; the server transmits the certificate application and the second user information to a third party verification interface according to the information transmission authorization instruction to perform certificate access verification of the second user, and obtains a returned access verification result.
It should be noted that, in the process of performing the certificate admission verification by the third party verification platform, it needs to verify whether the second user has the property right management qualification of the target property, and whether the first user is the property right person of the target property. Based on this, the third party verification platform performs certificate admission verification in the following way:
verifying whether the second user is a property owner of the target property based on the second user information;
if yes, returning the second user to the server as the property owner of the target property;
if not, checking whether the first user is the property owner of the target property based on the first user information carried by the certificate application; if yes, determining that the admission verification is passed; if not, determining that the admission verification fails.
Further, in the process of creating an identity certificate of a second user for a target property, if an admission verification result returned by the third-party verification interface is that the second user is a property owner of the target property, creating a master identity certificate of the second user for the target property; if the access verification result returned by the third-party verification interface is that verification is passed, a subordinate identity certificate of the second user aiming at the target property is created; and if the access verification result returned by the third-party verification interface is that the verification fails, the third-party verification interface does not process the access verification result.
In the process of scanning the identification code of the target property by the second user to establish the identity certificate, the second terminal executes the following steps: acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property; submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
The following takes the scenario of creating a master identity credential provided in this embodiment as an example to further describe the process of creating a master identity credential provided in this embodiment, and with reference to fig. 14, the process of creating a master identity credential applied to the scenario of creating a master identity credential specifically includes the following steps.
Step S1402, the first terminal submits the first user identifier to the server.
After that, the server issues an information reading authorization prompt to the first terminal based on the first user identification.
And step S1406, rendering and creating a guide page based on the information reading authorization reminder and displaying the guide page.
Step S1408, collecting the information reading authorization instruction of the first user and submitting the information reading authorization instruction to the server.
And then, reading the first user information based on the information reading authorization instruction, and issuing an information transmission authorization prompt to the first terminal based on the first user information.
In step S1412, the information transmission authorization instruction is acquired based on the information transmission authorization reminder and submitted to the server.
After that, the server transmits the first user information to a third-party verification interface for admission verification based on the information transmission authorization instruction; acquiring a property identifier of a target property returned by a third-party verification interface; and creating a master identity certificate of the first user aiming at the target property based on the property identification.
The identity credential processing method provided in this embodiment is further described below by taking an application of the identity credential processing method provided in this embodiment in a subordinate identity credential creation scenario as an example, and referring to fig. 15, the identity credential processing method applied in the subordinate identity credential creation scenario specifically includes the following steps.
Step S1502, an identification code of the second user is collected and recognized.
Step S1504, submitting an authorization application to the server based on the identification result.
After that, the server inquires the main identity certificate of the first user according to the authorization application; if the master identity certificate is not empty, desensitizing the second user information in the authorization application; and sending desensitization user information obtained by desensitization processing to the first terminal.
Step 1512, rendering and displaying the owner authorization page according to the desensitized user information.
Step S1514, collecting and submitting an authorization instruction of the first user to the server.
After that, the server reads the house identity corresponding to the master identity certificate based on the authorization instruction; and issuing the house identity to the first terminal.
Step S1520, the first terminal displays the property identifier in the form of a property list, and determines the target property selected by the first user.
Step S1522, sending the property id of the target property to the server.
After that, the server sends a type selection prompt to the first terminal and obtains the user type submitted by the first terminal; and creating a subordinate identity certificate of the second user for the target property based on the user type.
In summary, in the identity credential processing method provided in this embodiment, the identification code of the second user is collected and recognized, an authorization application is submitted to the server based on the recognition result, desensitization identity information issued by the server is received and displayed, an authorization instruction for the desensitization identity information, which is input by the first user, is obtained and submitted to the server, and finally interaction is performed by the server to determine the target property and the user type of the second user, so that convenience of using the credential application program by the user is improved, and user experience is improved.
The third embodiment of the identity credential processing method provided in this specification:
referring to fig. 17, which shows a processing flow chart of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a schematic diagram of a create guidance page provided in this embodiment, referring to fig. 3, which shows a schematic diagram of an identity verification page provided in this embodiment, referring to fig. 4, which shows a schematic diagram of an information transfer authorization page provided in this embodiment, referring to fig. 5, which shows a schematic diagram of a property list page provided in this embodiment, referring to fig. 6, which shows a schematic diagram of a detail presentation page provided in this embodiment, referring to fig. 7, which shows a schematic diagram of an identity credential list page provided in this embodiment, referring to fig. 8, which shows a schematic diagram of an identification code presentation page provided in this embodiment, referring to fig. 12, which shows a schematic diagram of a member list page provided in this embodiment, referring to fig. 13, which shows a schematic diagram of an invitation code presentation page provided in this embodiment, and referring to fig. 18, which shows a flowchart of a processing method of an identity credential applied to an identity credential creation scenario provided in this embodiment.
Referring to fig. 17, the identity credential processing method provided in this embodiment is applied to a server, and specifically includes steps S1702 to S1708.
Step 1702, obtaining a credential application submitted by a second user through scanning the identification code of the target property by the second terminal.
The identity voucher processing method provided by the embodiment cooperates with a third-party verification platform, the house property information is authenticated through the identity voucher, an owner can invite families or tenants to receive the subordinate identity voucher when acquiring the main identity voucher, the families or the tenants can also create the subordinate identity voucher through owner authorization under the condition that the owner fails to receive the main identity voucher, the owner utilizes the main identity voucher, and the families or the tenants utilize the subordinate identity voucher to be effectively connected with a service provider, so that service aggregation and display are realized, and the housing experience of the owner, the families and the tenants is improved.
In practical application, a proprietor rents own property to a tenant, and the tenant needs to pay water and electricity charges, use an electronic access control and the like. In specific implementation, in order to improve convenience of the owner for enjoying community services, the owner can open the master identity certificate of own property, and realize various services such as one-card pass, one-card reservation, one-card payment and one-card voting through the master identity certificate, after the owner rents the own property to a tenant, the owner can authorize the tenant to obtain the subordinate identity certificate of the rented property, so that the tenant can enjoy corresponding services by using the subordinate identity certificate, and in addition, the owner can invite the family members to open the subordinate identity certificate, so that the family members enjoy the corresponding services.
The second user includes a family and/or a tenant who opens the subordinate identity credential. The identification code of the target property is initiated by the first user and generated based on the first user information of the first user, the user type of the second user selected by the first user and the property identification of the target property. The first user comprises a user with property right management qualifications. Such as an owner, a title owner, or a user of a third party agency authorized by the owner. In this embodiment, if it is determined that the user has the property right management qualification, the user is determined to be the first user, and the master identity credential is created according to the owner identity of the first user. If the user does not have property right management qualification after the verification of the third-party verification platform, the user is determined to be a second user, an identification code is generated according to user information of the second user, the identification code is scanned and authorized by the first user, a subordinate identity certificate of the second user can be created, in addition, the identification code of the target property can be generated after the master identity certificate is received by the first user and shared to a second terminal, and the subordinate identity certificate of the second user for the target property is created by the second terminal through scanning the identification code.
In specific implementation, the first user who has received the master identity certificate can generate the identification code of the target property, and the second user can create the slave identity certificate of the second user after scanning the identification code. In an optional implementation manner provided by this embodiment, the master identity credential of the first user is opened in the following manner:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and performing identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to perform the access verification of the first user based on the information transmission authorization instruction submitted by the first terminal under the condition that the verification is passed.
Specifically, since the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third-party verification interface, and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the master identity certificate of the first user, the following steps are executed: acquiring the first user identification submitted by the first terminal; sending an information reading authorization prompt to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects an information reading authorization instruction of a first user and submits the information reading authorization instruction to a server; the server reads first user information based on the information reading authorization instruction and the first user identification, and performs biological feature recognition on the first user according to the first user information; if the identification is not passed, no processing is carried out; if the identification is passed, sending an information transmission authorization prompt to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting the information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to perform access verification of the first user.
Further, in order to guarantee the validity and authenticity of property right management quality of the first user, the third-party verification platform verifies the information of the first user, and under the condition that the first user is verified to have the property right management quality, a principal identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third-party platform performs admission verification by the following method:
based on the first user information, inquiring the property information corresponding to the first user;
sending the property information to the first terminal so that the first terminal can display the property information;
and creating a third-party identity certificate of the first user aiming at the target property selected by the first user through the property information.
Specifically, the third-party verification platform inquires the property information of the first user based on the first user information; sending the property information to a first terminal so that the first terminal can display the property information in a property list mode; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition of receiving the target property selected by the first user through the property list. In an optional implementation manner provided by this embodiment, after the third party verification platform creates the third party identity credential of the first user for the target property, the server performs the following operations:
acquiring a certificate identifier of the third-party identity certificate and a property identifier of the target property, which are returned by the third-party verification interface;
and creating a master identity certificate of the first user aiming at the target property based on the certificate identification and the property identification.
And the server creates a master identity certificate of the first user aiming at the target property according to the certificate identification of the third party identity certificate and the property identification of the target property returned by the third party verification interface. It should be noted that the property information of the first user is maintained by the third-party verification platform, and in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third-party verification platform, so that the third-party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the safety of the property information of the first user, when the third-party verification platform returns the property information of the target property to the server, desensitization processing can be performed on the property information, and then the acquired desensitization property information is returned.
For example, a first user accesses a credential application program by scanning a program identification code, searching a program name or other channels, a first terminal submits a first user identification of the first user to a server when detecting that the first user accesses the credential application program, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and after receiving the information reading authorization reminder, the first terminal renders a creation guidance page as shown in fig. 2 based on creation guidance content of an identity credential and the information reading authorization reminder and displays the creation guidance page. When detecting that a first user triggers the control of 'agreement protocol and face swiping for getting' in fig. 2, the first terminal submits an information reading authorization instruction to the server, the server receives the information reading authorization instruction, reads first user information according to a first user identification, desensitizes the first user information, sends the desensitized first user information to the first terminal, so that the first terminal collects a face image of the first user through an identity verification page shown in fig. 3, uploads the collected face image to the server, after the face image is verified by the server, sends an information transmission authorization prompt to the first terminal, the first terminal renders an information transmission authorization page shown in fig. 4 according to the information transmission authorization prompt and displays the information transmission authorization page, after detecting that the first user triggers the control of 'agreement' configured by the information transmission authorization page, submitting an information transmission authorization instruction to a server, transmitting first user information into a third-party verification interface by the server according to the information transmission authorization instruction, inquiring the property information of a property owner of a first user based on the first user information by a third-party verification platform, displaying the property information through a property list page shown in fig. 5, if detecting that the user selects 'xx cell xx multi-span 1 unit 2201' as a target property, creating a third-party owner card of the first user and the target property, and desensitizing the property identification of the target property; the server acquires the desensitized property identification returned by the third-party verification interface and the third-party owner card identification of the third-party owner card, and creates an owner card of the first user for the target property based on the desensitized property identification and the third-party owner card identification, wherein the owner card corresponds to the third-party owner card one by one. After creating the business master card, the first user may view the business master card and upon detecting a user access request to the business master card, present the user with a details presentation page as shown in fig. 6.
In addition, after creating the master identity certificate of the first user for the target property, the first user can also create master identity certificates of a plurality of properties. When a first user opens the master identity certificates of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the master identity certificates and improve the experience of the first user, if the first user opens a plurality of sets of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, the first user needs to be subjected to identity verification. Specifically, a newly added application for the identity certificate submitted by a first user through a first terminal is obtained, first user information is read based on the newly added application, and identity verification is performed on the first user according to the first user information; and if the verification is passed, transmitting the first user information into a third-party verification interface for access verification, acquiring a certificate identifier of the third-party new identity certificate and a building identifier of the new building returned by the third-party verification interface, and creating a master identity certificate of the first user for the new building based on the certificate identifier and the building identifier.
As shown in fig. 7, the first user can view the created owner card and the created auxiliary card through the identity credential list page, and can add new properties through the identity credential list page.
In specific implementation, if the result returned by the third-party verification interface is that the query result of the property information is empty, the user is determined to be a second user, an identification code of the second user is generated based on second user information of the second user, the identification code is sent to a second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user can obtain the subordinate identity certificate. In an optional implementation manner provided by this embodiment, the identification code is generated by adopting the following method:
reading the second user information according to the second user identification, and performing identity verification on the second user according to the second user information;
transmitting the second user information into a third party verification interface to perform admission verification of the second user based on an information transmission authorization instruction submitted by a second terminal under the condition that verification is passed;
and if the property information of the second user returned by the third-party verification interface is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable a second user who does not have property management qualification to receive the identity certificate by the identity of a tenant or a family member, under the condition that the query result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and is sent to the second terminal, the second user can share the identification code, and the user with the main identity certificate scans the identification code and authorizes the identification code so that the second user can receive the identity certificate.
For example, when the second terminal detects that the second user accesses the credential application, the second terminal submits a second user identifier of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and transmits the second user information to the third-party verification interface for admission verification based on the information transmission authorization instruction of the second user when the verification is passed, if the verification result returned by the third-party verification interface is obtained as that the property information of the second user is empty, an identification code is generated according to the second user information and is sent to the second terminal, and the second terminal renders and displays an identification code display page as shown in fig. 8 based on the identification code after receiving the identification code.
It should be noted that, after the second user acquires the identification code, the second user may share the identification code, and after the identification code is scanned, the authorization authority verification is performed on the first user who scans the identification code, that is, whether the first user has the master identity credential is verified. In an optional implementation manner provided by this embodiment, the first terminal acquires and identifies the identification code of the second user, and submits an authorization application to the server based on the identification result, and after the server obtains the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal, the following operations are performed: querying whether the first user has a master identity credential based on the first user identification; if so, desensitizing the second user information in the authorization application, and issuing the obtained desensitizing user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2.
In order to improve the perception degree of the owner on the certificate application program and improve the simplicity of the owner after the owner rents the house to the tenant, the owner can also actively invite the tenant or the family to receive the subordinate identity certificate after creating the main identity certificate. In this embodiment, after the first user creates the master identity credential for the target property, the family members or the tenants can be invited to receive the slave identity credential through the member management item of the master identity credential. In an optional implementation manner provided by this embodiment, the sharing request for the target property submitted by the first terminal is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation codes, renders an invitation code display page based on the family invitation codes and displays the invitation code display page, and the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, collecting the valid period of the subordinate identity certificate which is authorized by the first user to be used by the second user; submitting the valid period to the server; and the server generates the tenant invitation code based on the valid period, the property identification and the first user identification and sends the tenant invitation code to the first terminal so as to display the first terminal. It should be noted that the family invitation code and the tenant invitation code are both the identification codes of the target property. In an optional implementation manner provided by this embodiment, the identification code of the target property is generated as follows:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of the target property leased by the first user;
generating the identification code based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, if the owner views the detail display page shown in fig. 6 and triggers the member management item, the owner terminal displays the member list page shown in fig. 12, where the member list includes a user who picks up the owner card or the auxiliary card for the target property, and desensitizes the display of the member information in the member list in order to protect the information security of the user. The method comprises the steps that a member control is added by triggering of a proprietor, a proprietor terminal submits a sharing request aiming at a target property to a server, the server generates a family invitation code based on a property identification of the target property and the proprietor identification and sends the family invitation code to the proprietor terminal, the proprietor terminal renders an invitation code display page shown in figure 13 and displays the invitation code display page, if the proprietor terminal detects that a 'tenant invitation code' control configured on the invitation code display page is triggered, the proprietor is reminded to enter a valid period and submits the valid period to the server, the server creates a tenant code based on the valid period, the property identification and the proprietor identification and sends the tenant invitation code to the proprietor terminal, and the proprietor terminal displays the tenant invitation code after receiving the tenant invitation code. The owner can send the invitation code to the second user through a sharing invitation control configured on the invitation code display page.
In an optional implementation manner provided by this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring the identification code of the target property to obtain the first user identification and the property identification of the target property;
and submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through scanning the identification code of the target property by the second terminal.
In order to prevent the second user from opening the card for multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying the second user for the presence of the identity credential for the target property;
if so, sending an identity certificate viewing prompt to the second terminal so that the second terminal can display the identity certificate;
and if not, inquiring second user information of the second user based on a second user identifier carried in the certificate application.
Step S1704, querying second user information of the second user based on the second user identifier carried in the credential application.
Step S1706, the credential application and the second user information are transmitted to a third party verification interface to perform credential admission verification of the second user, and a returned admission verification result is obtained.
Step S1708, creating an identity credential of the second user for the target property according to the admission verification result.
If the second user does not receive the identity certificate aiming at the target property after the inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server and submits the information reading authorization prompt to the server when acquiring an information reading authorization instruction of a second user; the server inquires second user information of a second user based on a second user identifier carried in the certificate application after receiving the information reading authorization instruction, sends an information transmission authorization prompt to a second terminal based on the second user information after reading the second user information, displays the information transmission authorization prompt by the second terminal, and submits the information transmission authorization instruction of the second user to the server after acquiring the information transmission authorization instruction; the server transmits the certificate application and the second user information to a third party verification interface according to the information transmission authorization instruction to perform certificate access verification of the second user, and obtains a returned access verification result.
It should be noted that, in the process of performing the certificate admission verification by the third party verification platform, it needs to verify whether the second user has the property right management qualification of the target property, and whether the first user is the property right person of the target property. In an optional implementation manner provided by this embodiment, the third party verification platform performs credential admission verification by the following method:
verifying whether the second user is a property owner of the target property based on the second user information;
if yes, returning the second user to the server as the property owner of the target property;
if not, checking whether the first user is the property owner of the target property based on the first user information carried by the certificate application; if yes, determining that the admission verification is passed; if not, determining that the admission verification fails.
Further, in the process of creating an identity certificate of a second user for a target property, if an admission verification result returned by the third-party verification interface is that the second user is a property owner of the target property, creating a master identity certificate of the second user for the target property; if the access verification result returned by the third-party verification interface is that verification is passed, a subordinate identity certificate of the second user aiming at the target property is created; and if the access verification result returned by the third-party verification interface is that the verification fails, the third-party verification interface does not process the access verification result.
In the process of scanning the identification code of the target property by the second user to create the identity certificate, in an optional implementation manner provided by this embodiment, the second terminal performs the following steps: acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property; submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
The identity credential processing method provided in this embodiment is further described below by taking an application of the identity credential processing method provided in this embodiment in an identity credential creation scenario as an example, and referring to fig. 18, the identity credential processing method applied in the identity credential creation scenario specifically includes the following steps.
Step S1806, querying an identity credential of the second user for the target property based on the second user identifier in the credential application.
Before that, the second terminal collects and identifies the identification code of the target property, and submits a certificate application to the server based on the identification result.
Step S1808, if the query result is null, sending an information reading authorization reminder to the second terminal.
And after that, the second terminal displays the information reading authorization prompt and submits the information reading authorization prompt to the server when acquiring the information reading authorization instruction of the second user.
Step S1812, reading the second user information according to the information reading authorization instruction and the second user identifier.
Step S1814, sending an information delivery authorization reminder to the second terminal based on the second user information.
And after that, the second terminal displays the information transmission authorization prompt, collects the information transmission authorization instruction of the second user and submits the information transmission authorization instruction to the server.
Step S1818, according to the information transmission authorization instruction, transmitting the credential application and the second user information to the third party verification interface for credential admission verification, and obtaining the returned verification result.
And step S1820, creating an identity certificate of the second user for the target property according to the returned checking result.
To sum up, in the identity credential processing method provided in this embodiment, a credential application submitted by a second user scanning an identification code of a target property through a second terminal is first obtained, then second user information of the second user is queried based on a second user identification carried in the credential application, the credential application and the second user information are then transmitted to a third-party verification interface to perform credential admission verification of the second user, a returned admission verification result is obtained, and finally an identity credential of the second user for the target property is created according to the admission verification result, so that the second user can enjoy corresponding services after the identity credential is created by the first user through an invitation manner.
The fourth embodiment of the identity credential processing method provided in this specification:
referring to fig. 19, which shows a processing flow diagram of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a schematic diagram of a create guidance page provided in this embodiment, referring to fig. 3, which shows a schematic diagram of an identity verification page provided in this embodiment, referring to fig. 4, which shows a schematic diagram of an information transfer authorization page provided in this embodiment, referring to fig. 5, which shows a schematic diagram of a property list page provided in this embodiment, referring to fig. 6, which shows a schematic diagram of a detail presentation page provided in this embodiment, referring to fig. 7, which shows a schematic diagram of an identity credential list page provided in this embodiment, referring to fig. 8, which shows a schematic diagram of an identification code presentation page provided in this embodiment, referring to fig. 12, which shows a schematic diagram of a member list page provided in this embodiment, referring to fig. 13, which shows a schematic diagram of an invitation code presentation page provided in this embodiment, and referring to fig. 18, which shows a flowchart of a processing method of an identity credential applied to an identity credential creation scenario provided in this embodiment.
Referring to fig. 19, the identity credential processing method provided in this embodiment is applied to the second terminal, and specifically includes steps S1902 to S1908.
The execution subject of the identity credential processing method provided in this embodiment is the second terminal, the execution subject of the third identity credential processing method embodiment provided in this specification is the server, and the identity credential processing method applied to the second terminal provided in this embodiment is mutually matched with the identity credential processing method applied to the server provided in the above method embodiment in the execution process, so please refer to the corresponding contents of the above method embodiment in this embodiment.
Step S1902, acquiring an identification code of a target property, and obtaining a first user identifier and a property identifier of the target property.
The identity voucher processing method provided by the embodiment cooperates with a third-party verification platform, the house property information is authenticated through the identity voucher, an owner can invite families or tenants to receive the subordinate identity voucher when acquiring the main identity voucher, the families or the tenants can also create the subordinate identity voucher through owner authorization under the condition that the owner fails to receive the main identity voucher, the owner utilizes the main identity voucher, and the families or the tenants utilize the subordinate identity voucher to be effectively connected with a service provider, so that service aggregation and display are realized, and the housing experience of the owner, the families and the tenants is improved.
In practical application, a proprietor rents own property to a tenant, and the tenant needs to pay water and electricity charges, use an electronic access control and the like. In specific implementation, in order to improve convenience of the owner for enjoying community services, the owner can open the master identity certificate of own property, and realize various services such as one-card pass, one-card reservation, one-card payment and one-card voting through the master identity certificate, after the owner rents the own property to a tenant, the owner can authorize the tenant to obtain the subordinate identity certificate of the rented property, so that the tenant can enjoy corresponding services by using the subordinate identity certificate, and in addition, the owner can invite the family members to open the subordinate identity certificate, so that the family members enjoy the corresponding services.
The first user in this embodiment includes a user with property right management qualifications. Such as an owner, a title owner, or a user of a third party agency authorized by the owner. The second terminal corresponds to a second user, and the second user comprises a family member and/or a tenant for opening the subordinate identity certificate. The identification code of the target property is initiated by the first user and generated based on the first user information of the first user, the user type of the second user selected by the first user and the property identification of the target property.
In specific implementation, the first user who has received the master identity certificate can create the identification code of the target property and share the identification code with the second user, so as to create the slave identity certificate of the second user. In this embodiment, the server opens the master identity credential of the first user as follows:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and performing identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to perform the access verification of the first user based on the information transmission authorization instruction submitted by the first terminal under the condition that the verification is passed.
Specifically, since the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third-party verification interface, and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the master identity certificate of the first user, the following steps are executed: the server acquires the first user identification submitted by the first terminal; sending an information reading authorization prompt to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects an information reading authorization instruction of a first user and submits the information reading authorization instruction to a server; the server reads first user information based on the information reading authorization instruction and the first user identification, and performs biological feature recognition on the first user according to the first user information; if the identification is not passed, no processing is carried out; if the identification is passed, sending an information transmission authorization prompt to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting the information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to perform access verification of the first user.
Further, in order to guarantee the validity and authenticity of property right management quality of the first user, the third-party verification platform verifies the information of the first user, and under the condition that the first user is verified to have the property right management quality, a principal identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third-party platform performs admission verification by the following method:
based on the first user information, inquiring the property information corresponding to the first user;
sending the property information to the first terminal so that the first terminal can display the property information;
and creating a third-party identity certificate of the first user aiming at the target property selected by the first user through the property information.
Specifically, the third-party verification platform inquires the property information of the first user based on the first user information; the property information is sent to a first terminal, and the first terminal displays the property information in a property list form after receiving the property information; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition of receiving the target property selected by the first user through the property list. In this embodiment, after the third party verification platform creates the third party identity credential of the first user for the target property, the server performs the following operations:
acquiring a certificate identifier of the third-party identity certificate and a property identifier of the target property, which are returned by the third-party verification interface;
and creating a master identity certificate of the first user aiming at the target property based on the certificate identification and the property identification.
And the server creates a master identity certificate of the first user aiming at the target property according to the certificate identification of the third party identity certificate and the property identification of the target property returned by the third party verification interface. It should be noted that the property information of the first user is maintained by the third-party verification platform, and in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third-party verification platform, so that the third-party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the safety of the property information of the first user, when the third-party verification platform returns the property information of the target property to the server, desensitization processing can be performed on the property information, and then the acquired desensitization property information is returned.
For example, a first user accesses a credential application program by scanning a program identification code, searching a program name or other channels, a first terminal submits a first user identification of the first user to a server when detecting that the first user accesses the credential application program, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and after receiving the information reading authorization reminder, the first terminal renders a creation guidance page as shown in fig. 2 based on creation guidance content of an identity credential and the information reading authorization reminder and displays the creation guidance page. When detecting that a first user triggers the control of 'agreement protocol and face swiping for getting' in fig. 2, the first terminal submits an information reading authorization instruction to the server, the server receives the information reading authorization instruction, reads first user information according to a first user identification, desensitizes the first user information, sends the desensitized first user information to the first terminal, so that the first terminal collects a face image of the first user through an identity verification page shown in fig. 3, uploads the collected face image to the server, after the face image is verified by the server, sends an information transmission authorization prompt to the first terminal, the first terminal renders an information transmission authorization page shown in fig. 4 according to the information transmission authorization prompt and displays the information transmission authorization page, after detecting that the first user triggers the control of 'agreement' configured by the information transmission authorization page, submitting an information transmission authorization instruction to a server, transmitting first user information into a third-party verification interface by the server according to the information transmission authorization instruction, inquiring the property information of a property owner of a first user based on the first user information by a third-party verification platform, displaying the property information through a property list page shown in fig. 5, if detecting that the user selects 'xx cell xx multi-span 1 unit 2201' as a target property, creating a third-party owner card of the first user and the target property, and desensitizing the property identification of the target property; the server acquires the desensitized property identification returned by the third-party verification interface and the third-party owner card identification of the third-party owner card, and creates an owner card of the first user for the target property based on the desensitized property identification and the third-party owner card identification, wherein the owner card corresponds to the third-party owner card one by one. After creating the business master card, the first user may view the business master card and upon detecting a user access request to the business master card, present the user with a details presentation page as shown in fig. 6.
In addition, after creating the master identity certificate of the first user for the target property, the first user can also create master identity certificates of a plurality of properties. When a first user opens the master identity certificates of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the master identity certificates and improve the experience of the first user, if the first user opens a plurality of sets of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, the first user needs to be subjected to identity verification. Specifically, the server obtains a new application for the identity certificate submitted by a first user through a first terminal; reading first user information based on the new application; performing identity verification on the first user according to the first user information; if the verification is passed, the first user information is transmitted to a third party verification interface for access verification; acquiring a certificate identifier of a third party new identity certificate and a building identifier of a new building returned by a third party verification interface; and creating a master identity certificate of the first user for the newly added property based on the certificate identifier and the property identifier.
As shown in fig. 7, the first user can view the created owner card and the created auxiliary card through the identity credential list page, and can add new properties through the identity credential list page.
In specific implementation, if the result returned by the third-party verification interface is that the query result of the property information is empty, the user is determined to be a second user, an identification code of the second user is generated based on second user information of the second user, the identification code is sent to a second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user can obtain the subordinate identity certificate. In an optional implementation manner provided by this embodiment, the identification code is generated by adopting the following method:
reading the second user information according to the second user identification, and performing identity verification on the second user according to the second user information;
transmitting the second user information into a third party verification interface to perform admission verification of the second user based on an information transmission authorization instruction submitted by a second terminal under the condition that verification is passed;
and if the property information of the second user returned by the third-party verification interface is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable a second user who does not have property management qualification to receive the identity certificate by the identity of a tenant or a family member, under the condition that the query result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and is sent to the second terminal, the second user can share the identification code, and the user with the main identity certificate scans the identification code and authorizes the identification code so that the second user can receive the identity certificate.
For example, when the second terminal detects that the second user accesses the credential application, the second terminal submits a second user identifier of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and transmits the second user information to the third-party verification interface for admission verification based on the information transmission authorization instruction of the second user when the verification is passed, if the verification result returned by the third-party verification interface is obtained as that the property information of the second user is empty, an identification code is generated according to the second user information and is sent to the second terminal, and the second terminal renders and displays an identification code display page as shown in fig. 8 based on the identification code after receiving the identification code.
It should be noted that, after the second user acquires the identification code, the second user may share the identification code, and after the identification code is scanned, the authorization authority verification is performed on the first user who scans the identification code, that is, whether the first user has the master identity credential is verified. In an optional implementation manner provided by this embodiment, the first terminal acquires and identifies the identification code of the second user, and submits an authorization application to the server based on the identification result, and after the server obtains the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal, the following operations are performed: querying whether the first user has a master identity credential based on the first user identification; if so, desensitizing the second user information in the authorization application, and issuing the obtained desensitizing user information to the first terminal; if not, the first terminal is enabled to display the creation guidance page shown in fig. 2.
Step S1904, a credential application is submitted to a server based on the first user identifier, the property identifier, and the read second user identifier.
Step S1906, obtain and display the information transmission authorization reminder sent by the server.
Step S1908, collecting an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
In order to improve the perception degree of the owner on the certificate application program and improve the simplicity of the owner after the owner rents the house to the tenant, the owner can also actively invite the tenant or the family to receive the subordinate identity certificate after creating the main identity certificate. In this embodiment, after the first user creates the master identity credential for the target property, the family members or the tenants can be invited to receive the slave identity credential through the member management item of the master identity credential. In an optional implementation manner provided by this embodiment, the sharing request for the target property submitted by the first terminal is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation codes, renders an invitation code display page based on the family invitation codes and displays the invitation code display page, and the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, collecting the valid period of the subordinate identity certificate which is authorized by the first user to be used by the second user; submitting the valid period to the server; and the server generates the tenant invitation code based on the valid period, the property identification and the first user identification and sends the tenant invitation code to the first terminal so as to display the first terminal. It should be noted that the family invitation code and the tenant invitation code are both the identification codes of the target property. In an optional implementation manner provided by this embodiment, the identification code of the target property is generated as follows:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of the target property leased by the first user;
generating the identification code based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, if the owner views the detail display page shown in fig. 6 and triggers the member management item, the owner terminal displays the member list page shown in fig. 12, where the member list includes a user who picks up the owner card or the auxiliary card for the target property, and desensitizes the display of the member information in the member list in order to protect the information security of the user. The method comprises the steps that a member control is added by triggering of a proprietor, a proprietor terminal submits a sharing request aiming at a target property to a server, the server generates a family invitation code based on a property identification of the target property and the proprietor identification and sends the family invitation code to the proprietor terminal, the proprietor terminal renders an invitation code display page shown in figure 13 and displays the invitation code display page, if the proprietor terminal detects that a 'tenant invitation code' control configured on the invitation code display page is triggered, the proprietor is reminded to enter a valid period and submits the valid period to the server, the server creates a tenant code based on the valid period, the property identification and the proprietor identification and sends the tenant invitation code to the proprietor terminal, and the proprietor terminal displays the tenant invitation code after receiving the tenant invitation code. The owner can send the invitation code to the second user through a sharing invitation control configured on the invitation code display page.
In an optional implementation manner provided by this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring the identification code of the target property to obtain the first user identification and the property identification of the target property;
and submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through scanning the identification code of the target property by the second terminal.
In order to prevent the second user from opening the card for multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying the second user for the presence of the identity credential for the target property;
if so, sending an identity certificate viewing prompt to the second terminal so that the second terminal can display the identity certificate;
and if not, inquiring second user information of the second user based on a second user identifier carried in the certificate application.
The server inquires second user information of the second user based on a second user identifier carried in the certificate application, transmits the certificate application and the second user information into a third party verification interface to perform certificate access verification of the second user, and acquires a returned access verification result; and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
If the second user does not receive the identity certificate aiming at the target property after the inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server and submits the information reading authorization prompt to the server when acquiring an information reading authorization instruction of a second user; the server inquires second user information of a second user based on a second user identifier carried in the certificate application after receiving the information reading authorization instruction, sends an information transmission authorization prompt to a second terminal based on the second user information after reading the second user information, displays the information transmission authorization prompt by the second terminal, and submits the information transmission authorization instruction of the second user to the server after acquiring the information transmission authorization instruction; the server transmits the certificate application and the second user information to a third party verification interface according to the information transmission authorization instruction to perform certificate access verification of the second user, and obtains a returned access verification result.
It should be noted that, in the process of performing the certificate admission verification by the third party verification platform, it needs to verify whether the second user has the property right management qualification of the target property, and whether the first user is the property right person of the target property. In an optional implementation manner provided by this embodiment, the third party verification platform performs credential admission verification by the following method:
verifying whether the second user is a property owner of the target property based on the second user information;
if yes, returning the second user to the server as the property owner of the target property;
if not, checking whether the first user is the property owner of the target property based on the first user information carried by the certificate application; if yes, determining that the admission verification is passed; if not, determining that the admission verification fails.
Further, in the process of creating an identity certificate of a second user for a target property, if an admission verification result returned by the third-party verification interface is that the second user is a property owner of the target property, creating a master identity certificate of the second user for the target property; if the access verification result returned by the third-party verification interface is that verification is passed, a subordinate identity certificate of the second user aiming at the target property is created; and if the access verification result returned by the third-party verification interface is that the verification fails, the third-party verification interface does not process the access verification result.
In the process of scanning the identification code of the target property by the second user to create the identity certificate, in an optional implementation manner provided by this embodiment, the second terminal performs the following steps: acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property; submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
The identity credential processing method provided in this embodiment is further described below by taking an application of the identity credential processing method provided in this embodiment in an identity credential creation scenario as an example, and referring to fig. 18, the identity credential processing method applied in the identity credential creation scenario specifically includes the following steps.
And step S1802, the second terminal collects and identifies the identification code of the target property.
Step S1804, submitting the credential application to the server based on the recognition result.
After that, the server inquires the identity certificate of the second user aiming at the target property based on the second user identification in the certificate application; and if the query result is empty, sending an information reading authorization prompt to the second terminal.
Step S1810, the second terminal displays the information reading authorization prompt and submits the information reading authorization prompt to the server when acquiring the information reading authorization instruction of the second user.
After that, the server reads the second user information according to the information reading authorization instruction and the second user identification, and sends an information transmission authorization prompt to the second terminal based on the second user information.
Step S1816, the second terminal displays the information transmission authorization prompt, collects the information transmission authorization instruction of the second user, and submits the information transmission authorization instruction to the server.
After that, the server transmits an authorization instruction according to the information, transmits the certificate application and the second user information into a third party verification interface for certificate admission verification, and acquires a returned verification result; and creating an identity certificate of the second user aiming at the target property according to the returned checking result.
To sum up, in the identity credential processing method provided in this embodiment, an identification code of a target property is first acquired, a first user identifier and a property identifier of the target property are obtained, a credential application is then submitted to a server based on the first user identifier, the property identifier and a read second user identifier, an information transmission authorization prompt sent by the server is then acquired and displayed, and finally an authorization instruction of a second user is acquired and submitted to the server based on the information transmission authorization prompt, so that an identity credential of the second user is created by inviting the first user, and the second user can enjoy a corresponding service after creating the identity credential.
The first embodiment of the identity credential processing apparatus provided in this specification is as follows:
in the foregoing embodiment, an identity credential processing method applied to a server is provided, and correspondingly, an identity credential processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 20, a schematic diagram of an identity credential processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing apparatus, running in a server, including:
an application obtaining module 2002 configured to obtain an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
a desensitization processing module 2004, configured to perform desensitization processing on the second user information in the authorization application, and issue the obtained desensitization user information to the first terminal;
an information determining module 2006, configured to determine, according to an authorization instruction submitted by the first terminal for the desensitization user information, a target property and a user type of the second user through interaction with the first terminal;
a credential creating module 2008 configured to create an identity credential of the second user for the target property according to the user type.
The second embodiment of the identity credential processing apparatus provided in this specification is as follows:
in the foregoing embodiment, an identity credential processing method applied to a first terminal is provided, and correspondingly, an identity credential processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 21, a schematic diagram of an identity credential processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing apparatus, operating in a first terminal, including:
an application submission module 2102 configured to collect and identify an identification code of the second user, and submit an authorization application to the server based on the identification result;
an information presentation module 2104 configured to receive and present desensitization user information issued by the server;
an authorization submitting module 2106 configured to obtain an authorization instruction entered by the first user for the desensitized user information and submit the authorization instruction to the server;
an interaction coordination module 2108 configured to coordinate the server to interact to determine a target property and a user type of the second user.
The third embodiment of the identity credential processing apparatus provided in this specification is as follows:
in the foregoing embodiment, an identity credential processing method applied to a server is provided, and correspondingly, an identity credential processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 22, a schematic diagram of an identity credential processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing apparatus, running in a server, including:
an application acquisition module 2202 configured to acquire a credential application submitted by a second user scanning an identification code of a target property through a second terminal;
an information query module 2204, configured to query the second user information of the second user based on the second user identifier carried in the credential application;
the admission verification module 2206 is configured to transmit the credential application and the second user information to a third party verification interface to perform credential admission verification of the second user, and obtain a returned admission verification result;
a credential creating module 2208 configured to create an identity credential of the second user for the target property according to the admission verification result.
The fourth embodiment of the identity credential processing apparatus provided in this specification is as follows:
in the foregoing embodiment, an identity credential processing method applied to a second terminal is provided, and correspondingly, an identity credential processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 23, a schematic diagram of an identity credential processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing apparatus, operating in a second terminal, including:
the identification acquisition module 2302 is configured to acquire an identification code of a target property, and acquire a first user identification and a property identification of the target property;
an application submission module 2304 configured to submit a credential application to a server based on the first user identifier, the property identifier, and the read second user identifier;
a reminder presentation module 2306 configured to obtain and present the information delivery authorization reminder sent by the server;
an instruction submission module 2308 configured to collect an authorization instruction of a second user based on the information delivery authorization prompt and submit the authorization instruction to the server.
The first embodiment of the identity credential processing device provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the server, based on the same technical concept, one or more embodiments of the present specification further provide an identity credential processing device, where the identity credential processing device is configured to execute the above-described identity credential processing method, and fig. 24 is a schematic structural diagram of an identity credential processing device provided in one or more embodiments of the present specification.
The identity credential processing device provided by the embodiment includes:
as shown in fig. 24, the identity credential processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 2401 and a memory 2402, where the memory 2402 may store one or more stored applications or data. Memory 2402 may be, among other things, transient or persistent storage. The application stored in memory 2402 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in the identity credential processing device. Still further, processor 2401 may be configured to communicate with memory 2402 to execute a series of computer-executable instructions in memory 2402 on the identity credential processing device. The identity credential processing apparatus may also include one or more power supplies 2403, one or more wired or wireless network interfaces 2404, one or more input/output interfaces 2405, one or more keyboards 2406, etc.
In one particular embodiment, the identity credential processing apparatus comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the identity credential processing apparatus, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal;
according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal;
and creating an identity certificate of the second user for the target property according to the user type.
The second embodiment of the identity credential processing device provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the first terminal, based on the same technical concept, one or more embodiments of the present specification further provide an identity credential processing device, where the identity credential processing device is configured to execute the above-described provided identity credential processing method, and fig. 25 is a schematic structural diagram of an identity credential processing device provided in one or more embodiments of the present specification.
The identity credential processing device provided by the embodiment includes:
as shown in fig. 25, the identity credential processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 2501 and a memory 2502, where the memory 2502 may store one or more stored applications or data. Memory 2502 may be, among other things, transient or persistent storage. The application programs stored in memory 2502 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an identity credential processing device. Still further, the processor 2501 may be configured to communicate with the memory 2502 to execute a series of computer-executable instructions in the memory 2502 on the identity credential processing device. The identity credential processing apparatus may also include one or more power supplies 2503, one or more wired or wireless network interfaces 2504, one or more input/output interfaces 2505, one or more keyboards 2506, and the like.
In one particular embodiment, the identity credential processing apparatus comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the identity credential processing apparatus, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
acquiring and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result;
receiving and displaying desensitization user information issued by the server;
obtaining an authorization instruction for desensitization user information input by a first user and submitting the authorization instruction to the server;
and interacting with the server to determine the target property and the user type of the second user.
The third embodiment of the identity credential processing device provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the server, based on the same technical concept, one or more embodiments of the present specification further provide an identity credential processing device, where the identity credential processing device is configured to execute the above-described identity credential processing method, and fig. 26 is a schematic structural diagram of an identity credential processing device provided in one or more embodiments of the present specification.
The identity credential processing device provided by the embodiment includes:
as shown in fig. 26, the identity credential processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 2601 and a memory 2602, where the memory 2602 may store one or more stored applications or data. Memory 2602 may be, for example, transient storage or persistent storage. The application programs stored in memory 2602 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in the identity credential processing device. Still further, the processor 2601 may be configured to communicate with the memory 2602 to execute a series of computer-executable instructions in the memory 2602 on an identity credential processing device. The identity credential processing apparatus may also include one or more power supplies 2603, one or more wired or wireless network interfaces 2604, one or more input/output interfaces 2605, one or more keyboards 2606, and the like.
In one particular embodiment, the identity credential processing apparatus comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the identity credential processing apparatus, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
The fourth embodiment of the identity credential processing device provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the second terminal, based on the same technical concept, one or more embodiments of the present specification further provide an identity credential processing device, where the identity credential processing device is configured to execute the above-described provided identity credential processing method, and fig. 27 is a schematic structural diagram of an identity credential processing device provided in one or more embodiments of the present specification.
The identity credential processing device provided by the embodiment includes:
as shown in fig. 27, the identity credential processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 2701 and a memory 2702, where the memory 2702 may store one or more stored applications or data. Memory 2702 may be transient or persistent storage, among other things. The application programs stored in memory 2702 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an identity credential processing device. Still further, processor 2701 may be configured to communicate with memory 2702 to execute a series of computer-executable instructions in memory 2702 on the identity credential processing device. The identity credential processing apparatus may also include one or more power sources 2703, one or more wired or wireless network interfaces 2704, one or more input/output interfaces 2705, one or more keyboards 2706, and the like.
In one particular embodiment, the identity credential processing apparatus comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the identity credential processing apparatus, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
The first storage medium embodiment provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described identity credential processing method applied to the server.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal;
according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal;
and creating an identity certificate of the second user for the target property according to the user type.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity credential processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The second storage medium example provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described identity credential processing method applied to the first terminal.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result;
receiving and displaying desensitization user information issued by the server;
obtaining an authorization instruction for desensitization user information input by a first user and submitting the authorization instruction to the server;
and interacting with the server to determine the target property and the user type of the second user.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity credential processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The third storage medium embodiment provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described identity credential processing method applied to the server.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity credential processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The fourth storage medium example provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described identity credential processing method applied to the second terminal.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity credential processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly be distinguished between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: the ARC625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable identity credential processing device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable identity credential processing device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable identity credential processing device to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable identity credential processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer implemented process such that the instructions which execute on the computer or other programmable device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art from this document. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (25)

1. An identity credential processing method is applied to a server and comprises the following steps:
acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal;
according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal;
and creating an identity certificate of the second user for the target property according to the user type.
2. The identity credential processing method of claim 1, wherein before the step of obtaining the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal is executed, the method further comprises:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and performing identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to perform the access verification of the first user based on the information transmission authorization instruction submitted by the first terminal under the condition that the verification is passed.
3. The identity credential processing method of claim 2, the admission verification, comprising:
based on the first user information, inquiring the property information corresponding to the first user;
sending the property information to the first terminal so that the first terminal can display the property information;
and creating a third-party identity certificate of the first user aiming at the target property selected by the first user through the property information.
4. The identity credential processing method according to claim 3, further comprising, after the passing of the verification and the passing of the authorization instruction based on the information submitted by the first terminal, passing the first user information into a third-party verification interface for performing the admission verification step of the first user:
acquiring a certificate identifier of the third-party identity certificate and a property identifier of the target property, which are returned by the third-party verification interface;
and creating a master identity certificate of the first user aiming at the target property based on the certificate identification and the property identification.
5. The identity credential processing method according to claim 1, further comprising, after the step of obtaining the authorization application submitted by the first user after scanning the identification code of the second user through the first terminal is executed, and before the step of desensitizing the second user information in the authorization application and issuing the obtained desensitized user information to the first terminal is executed:
querying whether the first user has a master identity credential based on the first user identification;
if yes, executing the step of desensitizing the second user information in the authorization application and issuing the acquired desensitized user information to the first terminal;
correspondingly, the determining the target property and the user type of the second user through interacting with the first terminal includes:
reading the property identification in the master identity certificate, and sending the property identification to the first terminal so as to display the first terminal;
acquiring the property identification of the target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identification of the target property;
and acquiring the user type submitted by the first terminal.
6. The identity credential processing method according to claim 1, wherein the creating the identity credential of the second user for the target property according to the user type comprises:
if the user type is a tenant type, acquiring the valid period of the subordinate identity certificate of the target property authorized by the first user to use by the second user;
and creating a subordinate identity certificate of the second user for the target property based on the tenant type and the valid period.
7. The identity credential processing method as in claim 1, wherein the identification code is generated by:
reading the second user information according to the second user identification, and performing identity verification on the second user according to the second user information;
transmitting the second user information into a third party verification interface to perform admission verification of the second user based on an information transmission authorization instruction submitted by a second terminal under the condition that verification is passed;
and if the property information of the second user returned by the third-party verification interface is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
8. An identity certificate processing method is applied to a first terminal and comprises the following steps:
acquiring and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result;
receiving and displaying desensitization user information issued by the server;
obtaining an authorization instruction for desensitization user information input by a first user and submitting the authorization instruction to the server;
and interacting with the server to determine the target property and the user type of the second user.
9. An identity credential processing method is applied to a server and comprises the following steps:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
10. The identity credential processing method according to claim 9, before the step of obtaining the credential submitted by the second user by scanning the identification code of the target property through the second terminal is executed, further comprising:
reading first user information of a first user according to a first user identifier of the first user, and performing identity verification on the first user according to the first user information;
when the verification is passed, the first user information is transmitted to the third party verification interface to perform the access verification of the first user;
and creating a master identity certificate of the first user aiming at the target property according to the property identification of the target property returned by the third-party verification interface.
11. The identity credential processing method of claim 10, the identification code being generated by:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of the target property leased by the first user;
generating the identification code based on the tenant type, the expiration date, the target property, and/or the first user information.
12. The identity credential processing method of claim 9, the credential admission verification comprising:
verifying whether the second user is a property owner of the target property based on the second user information;
if not, checking whether the first user is the property owner of the target house or not based on the first user information carried by the certificate application; and if so, determining that the admission verification passes.
13. An identity certificate processing method is applied to a second terminal and comprises the following steps:
acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
14. An identity credential processing apparatus, operating in a server, comprising:
the application acquisition module is configured to acquire an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
a desensitization processing module configured to perform desensitization processing on the second user information in the authorization application and issue the obtained desensitization user information to the first terminal;
the information determination module is configured to determine a target property and a user type of the second user through interaction with the first terminal according to an authorization instruction for the desensitization user information, which is submitted by the first terminal;
and the certificate creating module is configured to create an identity certificate of the second user for the target property according to the user type.
15. An identity credential processing apparatus, operating in a first terminal, comprising:
the application submitting module is configured to collect and identify the identification code of the second user and submit the authorization application to the server based on the identification result;
the information display module is configured to receive and display desensitization user information issued by the server;
the authorization submitting module is configured to acquire an authorization instruction for the desensitized user information, which is input by a first user, and submit the authorization instruction to the server;
an interaction coordination module configured to coordinate the server for interaction to determine a target property and a user type of the second user.
16. An identity credential processing apparatus, operating in a server, comprising:
the application acquisition module is configured to acquire a certificate application submitted by a second user through the identification code of the second terminal scanning target property;
the information query module is configured to query second user information of the second user based on a second user identifier carried in the credential application;
the admission verification module is configured to transmit the certificate application and the second user information to a third-party verification interface to perform the admission verification of the certificate of the second user, and acquire a returned admission verification result;
and the certificate creating module is configured to create an identity certificate of the second user for the target property according to the admission verification result.
17. An identity credential processing apparatus, operating in a second terminal, comprising:
the system comprises an identification acquisition module, a first user identification and a property identification of a target property, wherein the identification acquisition module is configured to acquire an identification code of the target property and acquire the first user identification and the property identification of the target property;
the application submitting module is configured to submit a certificate application to a server based on the first user identification, the property identification and the read second user identification;
the reminding display module is configured to acquire and display the information transmission authorization reminding sent by the server;
and the instruction submitting module is configured to acquire an authorization instruction of the second user based on the information transmission authorization prompt and submit the authorization instruction to the server.
18. An identity credential processing device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal;
according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal;
and creating an identity certificate of the second user for the target property according to the user type.
19. An identity credential processing device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result;
receiving and displaying desensitization user information issued by the server;
obtaining an authorization instruction for desensitization user information input by a first user and submitting the authorization instruction to the server;
and interacting with the server to determine the target property and the user type of the second user.
20. An identity credential processing device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
21. An identity credential processing device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
22. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring an authorization application submitted by a first user after scanning an identification code of a second user through a first terminal;
desensitizing the second user information in the authorization application, and issuing the obtained desensitized user information to the first terminal;
according to the authorization instruction for desensitizing user information submitted by the first terminal, determining a target property and a user type of the second user through interaction with the first terminal;
and creating an identity certificate of the second user for the target property according to the user type.
23. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result;
receiving and displaying desensitization user information issued by the server;
obtaining an authorization instruction for desensitization user information input by a first user and submitting the authorization instruction to the server;
and interacting with the server to determine the target property and the user type of the second user.
24. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring a certificate application submitted by a second user through an identification code of a second terminal scanning target property;
inquiring second user information of the second user based on a second user identifier carried in the certificate application;
the certificate application and the second user information are transmitted into a third party verification interface to conduct certificate access verification of the second user, and a returned access verification result is obtained;
and creating an identity certificate of the second user aiming at the target property according to the admission verification result.
25. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring an identification code of a target property, and acquiring a first user identification and the property identification of the target property;
submitting a certificate application to a server based on the first user identification, the property identification and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and transmitting an authorization prompt based on the information, acquiring an authorization instruction of the second user, and submitting the authorization instruction to the server.
CN202110776010.4A 2021-07-08 2021-07-08 Identity credential processing method and device Active CN113436036B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202311410591.5A CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device
CN202110776010.4A CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110776010.4A CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311410591.5A Division CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Publications (2)

Publication Number Publication Date
CN113436036A true CN113436036A (en) 2021-09-24
CN113436036B CN113436036B (en) 2023-11-14

Family

ID=77759790

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110776010.4A Active CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device
CN202311410591.5A Pending CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202311410591.5A Pending CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Country Status (1)

Country Link
CN (2) CN113436036B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114429341A (en) * 2022-01-24 2022-05-03 吉林银行股份有限公司 Grouped payment method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156799A (en) * 2014-07-11 2014-11-19 广东建邦计算机软件有限公司 Floating population information management method and system
CN105913531A (en) * 2016-06-15 2016-08-31 广州市华标科技发展有限公司 Access control system and method based on certificate two-dimension codes
CN106097509A (en) * 2016-06-15 2016-11-09 广州市华标科技发展有限公司 A kind of access control system based on certificate Quick Response Code and method
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156799A (en) * 2014-07-11 2014-11-19 广东建邦计算机软件有限公司 Floating population information management method and system
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN105913531A (en) * 2016-06-15 2016-08-31 广州市华标科技发展有限公司 Access control system and method based on certificate two-dimension codes
CN106097509A (en) * 2016-06-15 2016-11-09 广州市华标科技发展有限公司 A kind of access control system based on certificate Quick Response Code and method
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114429341A (en) * 2022-01-24 2022-05-03 吉林银行股份有限公司 Grouped payment method, device and equipment
CN114429341B (en) * 2022-01-24 2022-12-02 吉林银行股份有限公司 Grouped payment method, device and equipment

Also Published As

Publication number Publication date
CN113436036B (en) 2023-11-14
CN117291760A (en) 2023-12-26

Similar Documents

Publication Publication Date Title
CN105530175B (en) Message processing method, device and system
RU2332807C2 (en) Method of quick registration for authentication of user and payment performance using two different communication channels and system therefor
CN114240404A (en) Virtual assistant in a communication session
JP7013711B2 (en) Digital community system
CN110177088B (en) Temporary identity authentication method, device and system
CN104079538A (en) Microblog aggregation method and system supporting cross-platform interaction
CN110334824B (en) Safe check-in method and device
KR102361227B1 (en) An apparatus for recognizing natural language of instant message and method thereof
JP6760974B2 (en) Transaction processing method and system
CN103279576A (en) Method for carrying out a distributed search
US20190197539A1 (en) Method of providing service for setting condition of card use, card company server and user terminal
CN113222726A (en) Electronic certificate processing method, device and equipment
CN113436036A (en) Identity certificate processing method and device
CN111259430A (en) Data processing method and device, electronic equipment and computer storage medium
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN104767668B (en) Group control method and system
CN112216362B (en) Authorization processing method and device and settlement processing method and device
CN115310958A (en) Payment method, device, equipment, system and medium based on 5G message application
KR102166499B1 (en) System for sharing abnormal transaction information and method thereof
KR20160014378A (en) The internet-site that is accessible by the person only, and accesses other internet-site as a visitor instead of the person, and has a internal function to access directly other inetrnet-site, and then the method of business which makes a profit on the internet site, and then the method to prevent a lost card's payment.
KR101798459B1 (en) Third parth authentication method using push message and system performing the same
CN105791232A (en) Non-public permission interaction method, device and system in social network
KR101150771B1 (en) Method and apparatus for providing social assurance services
CN117097687A (en) Instant messaging processing method and device, electronic equipment and storage medium
CN116975821A (en) Information processing method, apparatus, electronic device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant